Processed: Re: Bug#318123: Patch insufficient

2007-01-16 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: severity 318123 important Bug#318123: [CVE-2006-0061] xlockmore: xlock segfaults with libpam-opensc, returns to user session Bug#399003: xlock accepts empty password if opie is in the pam auth stack Severity set to `important' from `grave' thanks

Bug#318123: Patch insufficient

2007-01-16 Thread Jeroen van Wolffelaar
severity 318123 important thanks On Sat, Dec 09, 2006 at 11:36:02AM -0500, Michael Stone wrote: The best solution for now is probably just to conflict with libpam-opensc NMU'd with this 'solution' -- downgrading this bug and its sister one accordingly. I don't consider this bug adequately

Bug#318123: Patch insufficient

2006-12-09 Thread Andreas Barth
tags 318123 - patch thanks 10:55 Joey aba: fyi, patch in #318123 reichte evtl. nicht. Wenn das der patch ist, den wir auch fuer security hatten, reicht der nicht, weshalb es auch kein DSA gegeben hat. 10:56 Joey jwz hat auch eine neue version kuerzlich herausgegeben iirc. 10:56 aba Joey:

Bug#318123: Patch insufficient

2006-12-09 Thread Michael Stone
On Sat, Dec 09, 2006 at 11:01:01AM +0100, you wrote: (Summary: [EMAIL PROTECTED] says patch in #318123 is insufficient) No shit; I said that when I first saw the patch. The best solution for now is probably just to conflict with libpam-opensc; there's some work on rearchitecting the pam