Michal ??iha?? wrote:
> Hi
> 
> Dne Wed, 02 Jun 2010 19:52:49 +0200
> Moritz Muehlenhoff <j...@debian.org> napsal(a):
> 
> > the following security issue was reported on the oss-security mailing
> > list. We don't need to fix this in stable, but a fix for Squeeze might
> > still be appropriate.
> 
> I've just committed the fix into Git for 4.8.0 currently available in
> experimental (it will go to unstable once Python 2.6 is default).
> 
> Using rpm on Debian for installing binary packages is discouraged in
> various ways, 

Using any distribution using rpm for installing binary packages is
discouraged ;-)

> so the risk is not that high. Because of this I will
> probably delay upload when more things will pop up (eg. Python 2.6 is
> default in unstable).

I agree the risk is negligable.

There's also another issue reported for rpm, which has been assigned
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2197 :

https://bugzilla.redhat.com/show_bug.cgi?id=125517

This seems like an issue which could also affect a typical use case
of rpm in Debian. However, since the attack vector is very obscure
I don't think we need to fix it in Lenny.

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to