Hi Markus,

On Mon, May 16, 2022 at 12:52:59AM +0200, Markus Koschany wrote:
> Hi tony,
> 
> Am Sonntag, dem 15.05.2022 um 11:17 -0700 schrieb tony mancill:
> 
> > [...]
> > Any thoughts?  It's a tad messy either way, but using current versions
> > simplifies the porting of patches.
> 
> I haven't investigated the CVE closely enough but the current reverse-
> dependencies in Bullseye don't seem to be severely affected by it. bazel-
> bootstrap and libgoogle-api-client-java are more like leaf packages unless we
> take openrefine in bullseye-backports into consideration as well. 
> 
> We could also mark the CVE as ignored for Bullseye because of the minor 
> impact,
> or just upload the new google-http-client-java package to bullseye after
> approval by the release team and then update google-oauth-java-client as well.
> We just have to check if this breaks the two other packages in Bullseye 
> (bazel-
> bootstrap and google-api-client-java).
> 
> So yes, a newer upstream version is fine, if it does not break any existing
> packages and there is no other way or the alternative would be way too time
> consuming and inconvenient. 

That is a good suggestion to potentially mark the CVE as ignored.
Unless there is a specific need for the updates in bullseye, I don't
have a reason to push the issue.  I wanted to address the CVE in
testing/unstable, and didn't want to just disappear and ignore the issue
for the other suites.

And if there is a compelling need for the updates to land in bullseye,
we can revisit.

Thanks!

Attachment: signature.asc
Description: PGP signature

Reply via email to