Hi, * Gunnar Wolf <email@example.com> [2009-03-13 23:47]: [...] > > This is Debian bug #449544. > > > > Unfortunately the vulnerability described above is not important enough > > to get it fixed via regular security update in Debian oldstable. It does > > not warrant a DSA. > > > > However it would be nice if this could get fixed via a regular point update. > > Please contact the release team for this. > > Nico brought this point to our (pkg-perl's) attention - After some > discussion in the pkg-perl IRC channel, we found that the intermediate > releases between the version shipped in Etch (1.30) and the one where > this bug was fixed (1.38) were all reliability-related , and appear > to be not too broad. So, even if we could just pick up the required > changeset to make a specific 1.30-2+etch1 upload, it would be better > just to upload 1.38 to Etch instead - Please tell us what to do. Looking at the changelog it looks indeed like it would be a good idea to ship 1.38. Would that be a problem for the release team? Cheers Nico -- Nico Golde - http://www.ngolde.de - firstname.lastname@example.org - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
Description: PGP signature