> > What would be next? Is this the kind of bug for which you will prepare
> > a DSA (security), or is stable-pu and oldstable-pu enough?
>
> Once the fix is in unstable, this can safely go via the next buster.
> and stretch point release. Can you contact the stable release managers
> for it?
Ok,
Hi Santiago,
On Thu, Jul 11, 2019 at 06:03:15PM +0200, Santiago Vila wrote:
> Hi.
>
> I'm going to upload a fix for unstable in short (patches by Mark Adler,
> already applied by Markus Koschany in jessie LTS btw).
Thanks for doing the unstable upload.
> What would be next? Is this the kind of
Hi.
I'm going to upload a fix for unstable in short (patches by Mark Adler,
already applied by Markus Koschany in jessie LTS btw).
What would be next? Is this the kind of bug for which you will prepare
a DSA (security), or is stable-pu and oldstable-pu enough?
Thanks.
Hi Santiago,
On Fri, Jul 05, 2019 at 12:57:31PM +0200, Santiago Vila wrote:
> On Thu, Jul 04, 2019 at 10:50:46PM +0200, Salvatore Bonaccorso wrote:
> > Source: unzip
> > Version: 6.0-23
> > Severity: important
> > Tags: security upstream
> > Control: found -1 6.0-21+deb9u1
> > Control: found -1 6.
On Thu, Jul 04, 2019 at 10:50:46PM +0200, Salvatore Bonaccorso wrote:
> Source: unzip
> Version: 6.0-23
> Severity: important
> Tags: security upstream
> Control: found -1 6.0-21+deb9u1
> Control: found -1 6.0-21
>
> Hi,
>
> The following vulnerability was published for unzip.
>
> CVE-2019-13232
Source: unzip
Version: 6.0-23
Severity: important
Tags: security upstream
Control: found -1 6.0-21+deb9u1
Control: found -1 6.0-21
Hi,
The following vulnerability was published for unzip.
CVE-2019-13232[0]:
| Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP
| container, leadin
6 matches
Mail list logo