The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: URGENT: libXt problems



Mark Eichin <eichin@cygnus.com> writes:

> > our version is not setuid-root. What exploits are we vulnerable?
> 
> Any xterm-related ones.  I don't have them handy.  (I also don't know,
> but assume, that rxvt is vulnerable to the same things, since it's
> actually Xt that's the problem.)
> 
> As for -3.3: that is *not* an option unless we want to delay the
> release by at least a *month*.  [3.3 has *not* shipped yet; heck, I
> sent in some of my last round of debian improvements this past
> weekend, and got mail back that they were integrating them!]

If it were the only way of fixing the security bug we would have to do
this ...

> However, I have received some patches and can produce a 3.2-7 build
> with them this weekend.  I would like to know if the qa-team *wants*
> such a build, and if it should just go in frozen, and if it'll go in
> 1.3 or 1.3.1 or what...

... but this is definitely a better solution. I herewith retract my
"wait for 3.3" proposal.

IMHO this must go into 1.3, there is no point doing a release
containing well-known security bugs of this kind.

	Sven
-- 
Sven Rudolph <sr1@inf.tu-dresden.de> ; WWW : http://www.sax.de/~sr1/


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .