Hi all! Sorry to be jumping in without preserving the In-Reply-To.
Allard Hoeve wrote: >I'm afraid this new package introduces some serious errors in software >that depends on this package. I have tested the new package on three >different Sarge machines with the following results. Please reproduce >using attached perl script. This bug jumped up and bit us too during testing, and it has been reported as bug #356810: http://bugs.debian.org/356810 so, it is now clear that it poses a serious problem for users, as it breaks the default behaviour. However, >Please remove the update from the security archive. ...it is not that simple. If you read the original advisory: http://www.securityfocus.com/archive/1/archive/1/425966/100/0/threaded you'll see that we have (indirectly) been relying on weak and deprecated behaviour. While this is not the sort of breakage you expect from stable, it underlines that security is not just about blindly upgrading packages. So, it is probably better to get a heads-up from something that breaks down than getting the heads up from someone who breaks in... :-) The problem in this case is that we don't know if it is serious: "The difficulty of breaking data encrypted using this flawed algorithm is unknown, but it should be assumed that all information encrypted in this way has been, or could someday be, compromised." Given that the upgrade certainly breaks stable, a DSA could have suggested the workaround as the correct path for sysadmins: "If using Crypt::CBC versions 2.16 and lower, pass the -salt=>1 option to Crypt::CBC->new()." I.e., say "you should do this now to upgrade your systems". Many users are likely to be bit by this upgrade, so, indeed, it may be a reasonable path to remove the security upgrade and instead suggest the workaround. Best, Kjetil -- Kjetil Kjernsmo Information Systems Developer Opera Software ASA
pgpQXF0ABTsYf.pgp
Description: PGP signature