Hmm, so the problem still lies in the ipv6 support patch from debian,
but is not fixed by fixing the host && addr code flow. Probably your use
case (usage through xinetd) hits code that triggered the assertion (host
or addr is null) but will also trigger further failure...

-- 
Assertion failed at socket.c:629
https://bugs.launchpad.net/bugs/627973
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to