Bug#318123: Patch insufficient

2007-01-16 Thread Jeroen van Wolffelaar
severity 318123 important thanks On Sat, Dec 09, 2006 at 11:36:02AM -0500, Michael Stone wrote: > The best solution for now is probably just to conflict with > libpam-opensc NMU'd with this 'solution' -- downgrading this bug and its sister one accordingly. I don't consider this bug adequately sol

Processed: Re: Bug#318123: Patch insufficient

2007-01-16 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 318123 important Bug#318123: [CVE-2006-0061] xlockmore: xlock segfaults with libpam-opensc, returns to user session Bug#399003: xlock accepts empty password if opie is in the pam auth stack Severity set to `important' from `grave' > thanks St

Bug#318123: Patch insufficient

2006-12-09 Thread Michael Stone
On Sat, Dec 09, 2006 at 11:01:01AM +0100, you wrote: (Summary: [EMAIL PROTECTED] says patch in #318123 is insufficient) No shit; I said that when I first saw the patch. The best solution for now is probably just to conflict with libpam-opensc; there's some work on rearchitecting the pam suppo

Bug#318123: Patch insufficient

2006-12-09 Thread Andreas Barth
tags 318123 - patch thanks 10:55 < Joey> aba: fyi, patch in #318123 reichte evtl. nicht. Wenn das der patch ist, den wir auch fuer security hatten, reicht der nicht, weshalb es auch kein DSA gegeben hat. 10:56 < Joey> jwz hat auch eine neue version kuerzlich herausgegeben iirc. 10:56 < aba> Joey: