❦  3 septembre 2013 08:51 CEST, Salvatore Bonaccorso <car...@debian.org> :

>> > Please adjust the affected versions in the BTS as needed. At least
>> > 0.9.2 looks affected.
>> 
>> Hi Salvatore!
>> 
>> Previous versions are likely to be affected too. I will try to backport
>> the patches. For version in Jessie and unstable, I will just upload
>> 0.9.3.
>
> Thanks for your quick reply! From what I see about the vulnerability,
> I would say this does not warrant a DSA, as the exploitability seems
> to be limited to a user-assisted remote attacker.

The exploit can be triggered by a user using a message as a template for
a new message. This seems far-fetched, so I agree.

> Do you agree on that conclusion? If yes I will mark this in the
> security-tracker appropriately. Could you address in that case the
> updates trough a proposed-update instead?

OK.
-- 
Identify bad input; recover if possible.
            - The Elements of Programming Style (Kernighan & Plauger)

Attachment: signature.asc
Description: PGP signature

Reply via email to