Hi, Apologies for the delay in getting back to you.
For future reference, such requests are much easier for us to track, and less likely to fall between the cracks, if filed as appropriately usertagged bugs (e.g. via "reportbug release.debian.org"). On Sun, 2014-03-09 at 18:21 +0000, Ian Beckwith wrote: > The security team forwarded a buffer overflow bug in netkit-telnet-ssl > to me. The bug turned out not to be exploitable, it just causes a > segfault, but they recommended I contact the SRMs to include it in a > stable update. > > The fixed version, 0.17.24+0.1-24, is in testing. The diff from -23 > contains the fix but I've just noticed also contains a gratuitous > removal of .gitignore. Please feel free to go ahead with an upload containing that patch. The package should be versioned as 0.17.24+0.1-23+deb7u1, use "wheezy" as the changelog distribution and be built on a wheezy system or in a suitable chroot. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1403453438.7095.27.ca...@jacala.jungle.funky-badger.org