Inquiry on Bullseye and https://security-tracker.debian.org/tracker/CVE-2019-8457
Hi Debian Security Team,
I am inquiring on Debian Bullseye as it relates to:
https://security-tracker.debian.org/tracker/CVE-2019-8457
Specifically, it is noted the team has put in a good faith effort in 
analyzing the feasibility of backporting relevant patches to Bullseye, 
and classifying the urgency of such effort. My read of this so far is 
that it's a debug mode only exposure, normally disabled in production 
(by default).
With that said, for those environment who are using Bullseye, outside of 
the amount of changes required for the backport, is there any technical 
'gotchas' or further advice the team could provide for those who are 
considering a self-maintain of relevant patches from bookworm / sid into 
Bullseye while the discussion continues on this?
Thanks!
- Chris Peñalver
christopher.m.penalver@gmail.com
Reply to: