On Mon, Feb 20, 2012 at 07:36:14PM +, Adam D. Barratt wrote:
On Mon, 2012-02-20 at 19:15 +0100, Moritz Muehlenhoff wrote:
On Mon, Feb 20, 2012 at 11:04:20AM +0100, Thijs Kinkhorst wrote:
The patch looks good, but the targeted distribution should be 'stable',
not 'stable-security', as
Hi there!
On Thu, 09 Feb 2012 22:08:49 +0100, Luca Capello wrote:
--8---cut here---start-8---
Host = myimapserver.domain.com
Host = myimapserver-smd.domain.com
Hostname = myimapserver.domain.com
IdentityFile = ~/.ssh/id_rsa_smd
openssh_5.5p1-6+squeeze2_i386.changes uploaded successfully to localhost
along with the files:
openssh_5.5p1-6+squeeze2.dsc
openssh_5.5p1-6+squeeze2.debian.tar.gz
openssh-client_5.5p1-6+squeeze2_i386.deb
openssh-server_5.5p1-6+squeeze2_i386.deb
ssh_5.5p1-6+squeeze2_all.deb
On Tue, 2012-02-21 at 08:41 +, Colin Watson wrote:
On Mon, Feb 20, 2012 at 07:36:14PM +, Adam D. Barratt wrote:
On Mon, 2012-02-20 at 19:15 +0100, Moritz Muehlenhoff wrote:
The fix needs to be acked by the stable release managers, adding them to
CC.
Hmmm, it would be nicer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 20 Feb 2012 02:23:55 +
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome
openssh-client-udeb openssh-server-udeb
Architecture: source all i386
Version: 1:5.5p1-6+squeeze2
Distribution:
Your message dated Tue, 21 Feb 2012 19:17:11 +
with message-id e1rzvd5-0007et...@franck.debian.org
and subject line Bug#657445: fixed in openssh 1:5.5p1-6+squeeze2
has caused the Debian Bug report #657445,
regarding openssh-server: Forced Command handling leaks private information to
ssh
Notes:
Mapping stable to proposed-updates.
Accepted:
openssh-client-udeb_5.5p1-6+squeeze2_i386.udeb
to main/o/openssh/openssh-client-udeb_5.5p1-6+squeeze2_i386.udeb
openssh-client_5.5p1-6+squeeze2_i386.deb
to main/o/openssh/openssh-client_5.5p1-6+squeeze2_i386.deb
7 matches
Mail list logo