n-0.22/debian/changelog 2013-07-01 16:36:42.0 +0200
+++ qpid-python-0.22+dfsg/debian/changelog 2013-11-22 23:32:47.0
+0100
@@ -1,3 +1,10 @@
+qpid-python (0.22+dfsg-1) unstable; urgency=low
+
+ * QA upload.
+ * Strip specs/amqp.0-10.dtd from upstream tarball. (Closes: #7
tags 158637 + patch
thanks
As I stated, debian's linuxconf package should not be vulnerable, as it
is not installed setuid root.
Nevertheless, I've backported the patch from the latest upstream
version, which makes the exploit[1] fail even if you happen to set
linuxconf setuid root.
cheers,
Mic
2 matches
Mail list logo