Control: tags -1 + pending
On Sun, 2017-04-02 at 19:46 +0100, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
>
> On Sat, 2017-01-28 at 20:38 +0100, Guilhem Moulin wrote:
> > Moritz Mühlenhoff from the Security Team suggested to fix dropbear's
> > known vulnerabilities (CVE-2016-3116 and CV
Processing control commands:
> tags -1 + pending
Bug #852998 [release.debian.org] jessie-pu: package dropbear/2014.65-1
Added tag(s) pending.
--
852998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852998
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On Sun, 02 Apr 2017 at 19:46:16 +0100, Adam D. Barratt wrote:
> btw:
>
> ++for (i = 0; s[i] != '\0'; i++) {
>
> is there a reason that isn't using strlen(s)?
A naive implementation with strlen() would be O(n**2), because the strlen()
would be recalculated on each loop iteration. It could be
Control: tags -1 + confirmed
On Sat, 2017-01-28 at 20:38 +0100, Guilhem Moulin wrote:
> Moritz Mühlenhoff from the Security Team suggested to fix dropbear's
> known vulnerabilities (CVE-2016-3116 and CVE-2016-740[6-8]) via a point
> release, since they don't warrant a DSA.
[...]
> Could you consid
Processing control commands:
> tags -1 + confirmed
Bug #852998 [release.debian.org] jessie-pu: package dropbear/2014.65-1
Added tag(s) confirmed.
--
852998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852998
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu
Moritz Mühlenhoff from the Security Team suggested to fix dropbear's
known vulnerabilities (CVE-2016-3116 and CVE-2016-740[6-8]) via a point
release, since they don't warrant a DSA.
6 matches
Mail list logo