On Fri, 2020-02-21 at 17:20 +, Holger Levsen wrote:
> Hi Utkarsh,
>
> On Fri, Feb 21, 2020 at 10:37:06PM +0530, Utkarsh Gupta wrote:
> > Is it okay to add d/source/format file? Or should I instead be
> > applying patches via d/rules file?
>
> as a general rule: don't change the packaging
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: libpam-radius-auth
Version: 1.3.16-4.4+deb8u1
CVE ID : CVE-2015-9542
Debian Bug : 951396
A vulnerability was found in pam_radius: the password length check was
done incorrectly in the add_password() function in
Hello Credativ Team,
It seems that some months have passed since there was any activity on
the Xen package in Debian LTS jessie. Proceeding under the assumption
that Credativ was no longer maintaining Xen in Debian LTS jessie, a few
days ago I started looking into the existing open
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 22 Feb 2020 01:29:33 +0530
Source: libpam-radius-auth
Binary: libpam-radius-auth
Architecture: source amd64
Version: 1.3.16-4.4+deb8u1
Distribution: jessie-security
Urgency: medium
Maintainer: Fabio M. Di Nitto
Changed-By:
Hi Silvain,
On Sat, Feb 22, 2020 at 09:13:08AM +0100, Sylvain Beucler wrote:
> > On Fri, Feb 21, 2020 at 11:24:02PM +, Holger Levsen wrote:
> >> I just checked the lts git repo and the security tracker one, and there
> >> was
> >> no trace indicating that credativ was working on this, so I
On 22/02/2020 00:31, Roberto C. Sánchez wrote:
> On Fri, Feb 21, 2020 at 11:24:02PM +, Holger Levsen wrote:
>> Hi Roberto,
>>
>> besides what Moritz said...
>>
>> On Fri, Feb 21, 2020 at 01:37:14PM -0500, Roberto C. Sánchez wrote:
have you done this in coordination with credative who