close 430455
thanks
Aurelien Jarno dixit:
An upgrade to a 6.1 kernel may fix the bug.
It did. So the bug is closed for openssh.
How about, we either nuke the 5.4 and 7.0 kernels, or fix them too,
so that no other user will experience this problem?
bye,
//mirabile
--
I believe no one can
reopen 430455
thanks
On Tue, Jun 26, 2007 at 03:24:42PM +, Thorsten Glaser wrote:
close 430455
thanks
(a) Please don't use the 'close' command to close bugs; as
http://www.debian.org/Bugs/server-control notes, this is a
deprecated practice.
(b) I've already changed my local tree
Okay, I've found out more about the cause:
sshd is compiled as PIE (position independent executable), but only
Linux, NetBSD and MirBSD can execute them; FreeBSD, OpenBSD and
DragonflyBSD cannot. (The DragonFly gcc ignores -pie because it
knows that its kernel can't execute them anyway.)
So the
Thorsten Glaser a écrit :
Okay, I've found out more about the cause:
sshd is compiled as PIE (position independent executable), but only
Linux, NetBSD and MirBSD can execute them; FreeBSD, OpenBSD and
DragonflyBSD cannot. (The DragonFly gcc ignores -pie because it
knows that its kernel
Aurelien Jarno dixit:
Thorsten Glaser a C)crit :
Could you give us more details?
Sure, these are however also in the PR.
What problem do you get with this binary?
It's not executable.
Which architecture are you
kfreebsd-i386
And which kernel are you using?
Both 5.4 and 7.0 show the bug.
severity 430455 important
thanks
Thorsten Glaser a écrit :
Aurelien Jarno dixit:
Thorsten Glaser a C)crit :
Could you give us more details?
Sure, these are however also in the PR.
Ok, I haven't seen the original bug before, as it was not sent to the list.
Anyway kfreebsd-i386 is not
6 matches
Mail list logo