Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-04-08 Thread Adam D. Barratt
Control: tags -1 + pending On Sun, 2017-04-02 at 19:46 +0100, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Sat, 2017-01-28 at 20:38 +0100, Guilhem Moulin wrote: > > Moritz Mühlenhoff from the Security Team suggested to fix dropbear's > > known vulnerabilities (CVE-2016-3116 and CV

Processed: Re: Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-04-08 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + pending Bug #852998 [release.debian.org] jessie-pu: package dropbear/2014.65-1 Added tag(s) pending. -- 852998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852998 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-04-02 Thread Simon McVittie
On Sun, 02 Apr 2017 at 19:46:16 +0100, Adam D. Barratt wrote: > btw: > > ++for (i = 0; s[i] != '\0'; i++) { > > is there a reason that isn't using strlen(s)? A naive implementation with strlen() would be O(n**2), because the strlen() would be recalculated on each loop iteration. It could be

Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-04-02 Thread Adam D. Barratt
Control: tags -1 + confirmed On Sat, 2017-01-28 at 20:38 +0100, Guilhem Moulin wrote: > Moritz Mühlenhoff from the Security Team suggested to fix dropbear's > known vulnerabilities (CVE-2016-3116 and CVE-2016-740[6-8]) via a point > release, since they don't warrant a DSA. [...] > Could you consid

Processed: Re: Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-04-02 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #852998 [release.debian.org] jessie-pu: package dropbear/2014.65-1 Added tag(s) confirmed. -- 852998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852998 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#852998: jessie-pu: package dropbear/2014.65-1

2017-01-28 Thread Guilhem Moulin
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu Moritz Mühlenhoff from the Security Team suggested to fix dropbear's known vulnerabilities (CVE-2016-3116 and CVE-2016-740[6-8]) via a point release, since they don't warrant a DSA.