Hello Alvaro,

I am aware of the recent upstream report, and also the CVE entry that
was fixed in 2.6.18.

With respect to the latter, when I last talked to Debian's security
team years ago on the topic, they were not enthusiastic about bringing
the entire 2.6.18 into older Debian releases. As maintainer, it is my
position that an attempting to backport of just the security aspect is
too difficult to be feasible. It is certainly beyond my ability,
especially the testing aspect. Upstream is also not interested in
attempting a backport.

That stalemate, plus the non-earthshattering nature of the
vulnerability led to general inaction. Your choices are to wait a few
more years for this concern to fall into the dustbin of history, or if
you have the energy ping the Debian security team to see if they have
a different disposition these days.

With respect to 2.6.19 and/or patching the newest vulnerability,
thanks for the problem report, and the reminder. We'll either get a
patch in place or upstream should make a release relatively soon.
Again, while it is a XSS problem (what isn't?) I don't see this as
earth shattering - the vast majority of real-world deployments will
not be affected. If you wish to discuss further by private email I am
happy to do so.

-Jeff



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to