Honestly, the conditions involved are rare enough I don't think this is
worth fixing for squeeze. If you want to prepare a fix it's a fairly
easy patch linked from the MIT advisory. However I'd suggest that we
wait until a single user running squeeze comes forward and confirms they
are running
Dear maintainer,
Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:
squeeze (6.0.6) - use target stable
package: krb5
severity: important
version: 1.9.1+dfsg-3
tag: security
a new advisory for kerberos consisting only of denial-of-service issues:
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
3 matches
Mail list logo