On Thu, 2015-08-20 at 10:09 +0300, Sebastian Dröge wrote:
> Hi,
>
> On Mi, 2015-08-19 at 23:29 +0200, ben@decadent.org.uk wrote:
> > Hello dear maintainer(s),
> >
> > the Debian LTS team would like to fix the security issues which are
> > currently open in the Squeeze version of libvpx:
> > https://security-tracker.debian.org/tracker/CVE-2015-4485
> > https://security-tracker.debian.org/tracker/CVE-2015-4486
> >
> > Would you like to take care of this yourself? We are still
> > understaffed so any help is always highly appreciated.
>
> I would update the package, but unfortunately I don't know what changes
> are fixing these CVEs and there's not much information publically
> available.
Yes, I realised that when trying to work out whether squeeze is
affected.
> The only thing I know is that it's fixed by 1.4.0, but I
> assume you don't want to update to that as it includes lots of changes.
No I don't think so.
Ben.
--
Ben Hutchings
The generation of random numbers is too important to be left to chance.
- Robert Coveyou
Attachment:
signature.asc
Description: This is a digitally signed message part