Bug#377047: [Pkg-openldap-devel] Bug#377047: slapd: Vulnerable to
	CVE-2006-2754 (buffer overflow)
    Martin Pitt 
    mpitt at debian.org
       
    Sun Jul  9 13:51:37 UTC 2006
    
    
  
Hi Torsten,
Torsten Landschoff [2006-07-08 17:42 +0200]:
> > There is a buffer overflow in st.c. Please see
> > 
> >   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754
> > 
> > for links to more detailled descriptions and a pointer to the upstream
> > CVS patch.
> > 
> > Please mention the CVE number in the changelog when you fix this.
> 
> How is the current procedure for security uploads (RTFM pointer is good
> enough)? We can surely provide an updated package for sarge but I fear 
> duplicated work with the security team. 
Normally the security team is glad to get security updates prepared by
the maintainers. Please just mail security at d.o. with a short
description and the CVE number and tell them that you will prepare an
update. Then follow up with a source package and they will you give ok
to upload or discuss changes with you.
http://www.de.debian.org/doc/developers-reference/ch-pkgs.en.html#s-bug-security
has some more details.
Thanks,
Martin
-- 
Martin Pitt        http://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org
In a world without walls and fences, who needs Windows and Gates?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.alioth.debian.org/pipermail/pkg-openldap-devel/attachments/20060709/3a1b744c/attachment.pgp
    
    
More information about the Pkg-openldap-devel
mailing list