severity 352849 serious
thanks

Steve Langasek <[EMAIL PROTECTED]> wrote:

>> If you think I should leave the bug RC pending a reliable way to
>> reproduce the problem in sid, please upgrade.  Note also that the
>> current sid version contains a security fix that is not in etch, but
>> as far as I know, the etch version does not contain the bug.
>
> Well, I'm really just wondering if there's any way that this bug could be
> tripped by a program that could happen to be a MIME type handler by feeding
> it a specially-crafted image, leading to arbitrary code execution.  It
> sounds like there's not enough information available to answer that yet
> simply because the segfault isn't reproducible, so please just keep this
> possibility in mind while investigating.

I've bumped this back up to serious since tiff would transition today
with the RC bug cleared.  If I determine that there is a security hole
here, I'll close the bug by uploading a new version, and we'll just
restart the clock.  Otherwise, I'll downgrade the bug, wait for
3.8.0-2 to transition, and then upload.  I can't see any reason at
this stage to rush 3.8.0-2 into etch while this issue is not fully
understood.  Thanks for your comments.

--Jay


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to