On Wed, Sep 05, 2007 at 05:03:25PM -0000, Adna rim wrote:
> So what alternative we have here? Letting a version in the repos which
> you are totally aware that it is vulnerable and my lead to arbitrary
> code execution or spending 5min just to take the updated version of
> 2.4.5.

Agreed; it is a lot of work.  That's what makes an upstream easy to work
with or not for doing security updates.  You can also check into SRU[1]
but that requires minimal changes too.  Perhaps backports[2], once it is
fixed in Gutsy?


[1] https://wiki.ubuntu.com/StableReleaseUpdates
[2] https://wiki.ubuntu.com/BackportRequestProcess

-- 
Sylpheed POP3 Format String Vulnerability
https://bugs.launchpad.net/bugs/136302
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to