On Wednesday, October 21 2015, Henri Salo wrote:

>> While I agree that the current solution still needs some improvement, I do
>> believe that, as far as security is concerned, the behavior described in this
>> report does not exist anymore.
>
> Then you can close this bug.

This bug is important enough that it deserves a double-check, therefore
I do not think I can just close it out of nowhere.

>> I realize it has been a long time since this bug (and this package) has
>> received any attention
>
> Received attention should not be the indicator of whether bug should be closed
> or not.

I did not say this.

> I do not know what happened to tags in this bug report, but in Debian security
> tracker this issue has been marked as fixed in 0.2.7-1.1 version. There is 
> also
> a note that Midori should not be used if SSL support is important to you. Is
> this correct information?

To the extent of my knowledge, no.

> Please see: https://security-tracker.debian.org/tracker/CVE-2010-3900

What makes you think I did not see this?

> I can also do some testing if that is needed. If user should not use Midori 
> when
> SSL/TLS support is important then it should be clearly pointed out at least in
> the man page.

I would appreciate more testing, of course.  That is why I decided to
ping this bug instead of closing it.

-- 
Sergio
GPG key ID: 237A 54B1 0287 28BF 00EF  31F4 D0EB 7628 65FC 5E36
Please send encrypted e-mail if possible
http://sergiodj.net/

Attachment: signature.asc
Description: PGP signature

Reply via email to