Hi Bernd,

On Mon, Apr 01, 2019 at 12:41:30AM +0200, Bernd Zeimetz wrote:
> Hi,
> 
> On 3/30/19 8:32 AM, Salvatore Bonaccorso wrote:
> > Hi Bernd,
> > 
> > On Fri, Mar 29, 2019 at 10:54:50PM +0100, Bernd Zeimetz wrote:
> >> Hi Salvatore,
> >>
> >>> The following vulnerability was published for gpsd, not competely sure
> >>> on severity and on if the referenced upstream commit is enough.
> >>> Ideally though the fix seems ideal to go to buster.
> >>
> >> I've tried to get more information out of Upstream, but did not get a
> >> reply yet. So I'll prepare an upload with the mentioned commit. Looking
> >> trough the commit logs from gpsd it seems to be the only relevant one.
> > 
> > Ack thank you for investigating, I was neither more successfull to
> > determine if that's enough.
> > 
> > Cc;ing the security team alias, if anyone has more ideas.
> 
> So I'd go with
> https://github.com/bzed/pkg-gpsd/blob/buster/debian/patches/json-cve-fix
> 
> which contains all changes to json.c/.h up to
> a399e85c1201400e281f2c1dc29dde21c29b0088
> 
> from the upstream repository.
> 
> Later changes are not relevant here.
> 
> Any objections?

Makes sense.

Once uploaded to unstable, can you ask for an unblock so it will reach
buster?

Regards,
Salvatore

Reply via email to