Am Tue, 27 Sep 2016 18:50:35 +0200
schrieb Florian Weimer <f...@deneb.enyo.de>: 

> Debian is a CNA-covered product, mpg123 is part of Debian,
> so it is unclear what to do here.  I'll ask around.

Well, so far I did not get a response from http://iwantacve.org/
(linked from
http://cve.mitre.org/cve/data_sources_product_coverage.html, btw. both
not defaulting to https) … I am not sure how long I should wait. Maybe
the "Distributed Weakness Filing Project" consists of humans that don't
work around the clock. If there is a number from Debian, it's fine by
me. We should just avoid that there are two associations.

And, well mpg123 is part of Debian and numerous other distros/ports
trees, as well as a stand-alone product people install on their MS
Windows machines, or under OS/2 (yes, really;-) … or in yet other
contexts. Like just about any other open source project. I guess
getting a CVE via the Debian umbrella might be the easiest route,
though.

Getting the fix to the users is my top priority. Even without CVE, a
debian bug report hopefully triggers a good number of downstream
distros at least.


Alrighty then,

Thomas

Attachment: pgp6eMnxj5x4f.pgp
Description: Digitale Signatur von OpenPGP

Reply via email to