On Thu, May 11, 2017 at 05:20:55PM +0300, Adrian Bunk wrote:
> On Thu, Feb 09, 2017 at 11:38:29AM -0300, dequis wrote:
> > Package: bitlbee
> > Version: 3.4.2-1.1
> > Severity: grave
> > Tags: upstream security patch fixed-upstream
> > 
> > Hi,
> > 
> > I'm opening this bug since #853282, which was just fixed by the
> > 3.5.1-1 upload, seems to apply to sid only.
> > 
> > CVE-2016-10188 is "bitlbee-libpurple: Use after free when expiring
> > file transfer requests"
> > 
> > https://security-tracker.debian.org/tracker/CVE-2016-10188
> > 
> > CVE-2016-10189 is "Null pointer dereference with file transfer request
> > from unknown contacts"
> > 
> > https://security-tracker.debian.org/tracker/CVE-2016-10189
> > 
> > The current version in sid would fix both of these issues for stretch,
> > but it's blocked due to the freeze. I would like to request an unblock
> > for that particular case, if possible.
> 
> These CVEs are now fixed in wheezy (by Thorsten) and stretch since 
> February, but people upgrading from for wheezy to jessie are losing
> the fixes since they aren't fixed there.
> 
> They are not marked "no DSA" in
>   https://security-tracker.debian.org/tracker/source-package/bitlbee
> 
> Does the security team plan to release a DSA?
> 
> Or should/could someone (Thorsten?) upload these fixes for the next 
> jessie point release?

No, this can be fixed via security.debian.org if someone prepares
a tested update.

Cheers,
        Moritz

Reply via email to