severity 318123 important
thanks
On Sat, Dec 09, 2006 at 11:36:02AM -0500, Michael Stone wrote:
> The best solution for now is probably just to conflict with
> libpam-opensc
NMU'd with this 'solution' -- downgrading this bug and its sister one
accordingly. I don't consider this bug adequately sol
Processing commands for [EMAIL PROTECTED]:
> severity 318123 important
Bug#318123: [CVE-2006-0061] xlockmore: xlock segfaults with libpam-opensc,
returns to user session
Bug#399003: xlock accepts empty password if opie is in the pam auth stack
Severity set to `important' from `grave'
> thanks
St
On Sat, Dec 09, 2006 at 11:01:01AM +0100, you wrote:
(Summary: [EMAIL PROTECTED] says patch in #318123 is insufficient)
No shit; I said that when I first saw the patch. The best solution for
now is probably just to conflict with libpam-opensc; there's some work
on rearchitecting the pam suppo
tags 318123 - patch
thanks
10:55 < Joey> aba: fyi, patch in #318123 reichte evtl. nicht. Wenn das
der patch ist, den wir auch fuer security hatten, reicht der nicht,
weshalb es auch kein DSA gegeben hat.
10:56 < Joey> jwz hat auch eine neue version kuerzlich herausgegeben iirc.
10:56 < aba> Joey:
4 matches
Mail list logo