Alright I guess I'll have to take this to debian-security then, this may
even warrant a CVE
On Fri, Aug 4, 2017 at 9:23 AM Alexander Wirt <formo...@debian.org> wrote:
> On Fri, 04 Aug 2017, Adam McKenna wrote:
>
> > That makes no sense, if that's the case then why is
org> wrote:
> fixed 701200 2.4-1
> thanks
>
> On Fri, 04 Aug 2017, Adam McKenna wrote:
>
> > tag 701200 security
> >
> > This is not just a bug, this is a gaping security hole. The default
> > configuration is wide open on ipv6.
> >
> > Pleas
On Sat, Mar 04, 2006 at 04:47:17PM -0800, Steve Langasek wrote:
Well, I agree with you that overruling the foundation documents is out of
scope for the technical committee; except the tech ctte has not been asked to
interpret or overrule the foundation documents. The Social Contract
mandates
I'm experiencing the same issue with this package. Here's an strace -f of
the sshd process, starting after I typed my password (password removed).
Process 5023 attached - interrupt to quit
read(6, \0\0\0\21, 4) = 4
read(6, 4\0\0\0\1\0\0\0\10, 17) = 17
write(7, \0\0\0\r\6, 5)
severity 30994 wishlist
thanks
There is no consensus that this package should be removed. Since I am still
willing to maintain it, I don't believe removal is appropriate at this time.
Regards,
--Adam
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble?
5 matches
Mail list logo