Hi Tim,
* Tim Brown <[EMAIL PROTECTED]> [2008-02-19 20:57]:
> On Tuesday 19 February 2008 19:20:23 Nico Golde wrote:
> 
> > * Tim Brown <[EMAIL PROTECTED]> [2008-02-19 20:08]:
> > > I've just notice that the security tracker
> > > http://security-tracker.debian.net/tracker/status/release/unstable has
> > > been updated for festival.  However it is wrong.  This bug *is* remotely
> > > exploitable (due to the afore mentioned lack of ACLs).
> >
> > Sure it is :) The remote exploitability status isn't set
> > manually by us. This is extracted automatically from the NVD
> > text http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4074 which
> > doesn't mention the word 'remote'. I think that's the
> > reason. Patches welcome :)
> 
> Okay, so the CVE entry is wrong (which probably explains why it wasn't 
> correctly resolved by the maintainers when it was first looked at).

Maybe it's also the Access Vector: string, not sure. Florian 
Weimer knows the details.

> It 
> probably also needs rewording since SuSE confirmed it affected them and I 
> think we agree it affects Debian.  How do we go about doing that - is that 
> something for you guys or do I need to get involved?

I see your point, I will contact mitre to update the CVE id 
or to assign a new one.

> Also, since we have a working patch for the issue on mentors what happens 
> now.  
> Can it go through as NMU?

The maintainer already uploaded a fixed version to unstable 
so no need for that. An NMU is only needed if the maintainer 
can't do an upload himself.

> What about the backport to stable and testing?

The package should migrate to testing in two days. If it has 
problems on migration we may do a testing security upload 
for this. For stable please contact. Referring to our svn 
the stable security did not release a DSA for CVE-2007-4074 
because it was a minor issue. If you think this should get 
fixed in stable please contact [EMAIL PROTECTED]

I guess they will happily release a DSA if someone comes up 
and provides a fixed stable package that just works.

If not, the maintainer still has a high chance to get this 
fixed via a regular point update. For this please contact 
the release team.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgphOu1LUlfsj.pgp
Description: PGP signature

Reply via email to