https://bugzilla.novell.com/show_bug.cgi?id=767770
https://bugzilla.novell.com/show_bug.cgi?id=767770#c7
Andreas Stieger
But we have prooven in past that wicd contains root holes. Do we want that again?
Certainly not. I suggest the following steps going forward to get to an informed decision either way: Sebastian, can you please provide information/bug/ML references to the last review you are referring to? Phil, can you then please outline how development of wicd has since addressed these issues? Failing to do that would mean that wicd will not become part of openSUSE. Is that a reasonable way forward? Some recent highlights: 1.7.2.4 priv escalation exploit for wicd possible 1.7.2.2 Fix for CVE-2012-2095 invalidates most encryption templates https://launchpad.net/wicd/+announcement/9888 1.7.2: Major Changes: - Fix local privilege escalation when setting configuration properties through the daemon's DBus interface (CVE-2012-2095). - Support passing no driver to wpa_supplicant. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.