On Fri, Aug 28, 2009 at 12:22:06AM +0200, gregor herrmann wrote:
> On Thu, 27 Aug 2009 21:27:13 +0200, Bas Zoetekouw wrote:
> 
> > > FYI I'm preparing stable updates of perl and libcompress-raw-zlib-perl
> > > because of the identical issue in Compress-Raw-Zlib (CVE-2009-1391). The
> > > security team recommended this because they are too busy to prepare DSAs
> > > for such minor issues.
> > > 
> > > Please consider updating libcompress-raw-bzip2-perl too. The window for
> > > the next stable update is closing this weekend.
> > 
> > Unfortunately I don't have access to my Debian machines at the moment
> > (I'm in the middle of moving house).  Gregor volunteered to NMU the
> > package though.
> > Gregor, do you think you'll have time to NMU on such short notice?
> 
> Oops, seems I should read all mails before preparing debdiffs after
> reading the first one :)
> 
> Anyway, you've seen my tentative diff, and I also have time on Friday
> and Sunday for any changes and uploads.

Thanks for picking this up Gregor. Not sure if a testcase can be found
through the CVE entries, so I'm attaching one for your convenience.

> Cheers,
> gregor, who is just a bit confused why libcompress-raw-zlib-perl goes
>         to s-p-u and libcompress-raw-bzip2-perl maybe to
>         stable-security

Has the security team acked a libcompress-raw-bzip2-perl upload?
I assumed this one would go through s-p-u too.
-- 
Niko Tyni   nt...@debian.org
#!/usr/bin/perl -w

# dd if=/dev/zero bs=16384 count=1 | bzip2 - | valgrind perl bunzip2.pl >/dev/null

use strict ;
use Compress::Raw::Bzip2;

local $/ = undef;
Compress::Raw::Bunzip2->new->bzinflate(<>, my $out);
print $out;

Reply via email to