On 2020-01-05 09:43, Felix Lechner wrote:
> Hi Aurelien,
>
> On Sun, Dec 8, 2019 at 3:08 PM Aurelien Jarno wrote:
> >
> > Hi,
> >
> > On 2019-12-07 13:42, Felix Lechner wrote:
> > > Hi,
> > >
> > > Starting in `libc6 2.29-5`, the Lintian test
> > > `t/tags/checks/binaries/binaries-obsolete-des`
On Jan 05, Aurelien Jarno wrote:
> The bcrypt() function has been moved out of libc and is now provided by
> libxcrypt. Reassigning the bug accordingly.
libxcrypt's crypt(3) supports bcrypt and also more modern methods, so
the bug can be closed.
Some work in the PAM package is still desirable,
Hi Aurelien,
On Sun, Dec 8, 2019 at 3:08 PM Aurelien Jarno wrote:
>
> Hi,
>
> On 2019-12-07 13:42, Felix Lechner wrote:
> > Hi,
> >
> > Starting in `libc6 2.29-5`, the Lintian test
> > `t/tags/checks/binaries/binaries-obsolete-des` fails in `unstable`:
> >
> > cc -g -O2
> >
Your message dated Sun, 5 Jan 2020 15:23:22 +0100
with message-id <20200105142322.ga1718...@aurel32.net>
and subject line Re: Bug#714219: libc6: crypt(3) returns NULL with EINVAL
instead of falling back to DES, breaking GNU software
has caused the Debian Bug report #714219,
regarding libc6:
Processing control commands:
> reassign -1 libxcrypt
Bug #149452 [libc6] libc6: OpenBSD's bcrypt password hashing support
Bug reassigned from package 'libc6' to 'libxcrypt'.
No longer marked as found in versions 2.2.5-6.
Ignoring request to alter fixed versions of bug #149452 to the same values
control: reassign -1 libxcrypt
control: retitle -1 libxcrypt: OpenBSD's bcrypt password hashing support
On 2002-06-09 14:51, J.H.M. Dassen (Ray) wrote:
> Package: libc6
> Version: 2.2.5-6
> Severity: wishlist
>
> It would be nice if libc6's crypt were to support the bcrypt hashing
> algorithm
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 05 Jan 2020 13:03:42 +0100
Source: glibc
Architecture: source
Version: 2.29-8
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers
Changed-By: Aurelien Jarno
Closes: 945250
Changes:
glibc
glibc_2.29-8_source.changes uploaded successfully to localhost
along with the files:
glibc_2.29-8.dsc
glibc_2.29-8.debian.tar.xz
glibc_2.29-8_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Sun, 05 Jan 2020 12:35:10 +
with message-id
and subject line Bug#945250: fixed in glibc 2.29-8
has caused the Debian Bug report #945250,
regarding glibc: CVE-2019-19126
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
d9f82bd4 by Aurelien Jarno at 2020-01-05T13:03:49+01:00
releasing package glibc version 2.29-8
- - - - -
1 changed file:
- debian/changelog
View it on GitLab:
Processing control commands:
> tag -1 pending
Bug #945250 [src:glibc] glibc: CVE-2019-19126
Added tag(s) pending.
--
945250: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
b7436b76 by Aurelien Jarno at 2020-01-05T11:43:25+01:00
debian/patches/git-updates.diff: update from upstream stable branch:
* debian/patches/git-updates.diff: update from upstream stable branch:
- Fixes ASLR
12 matches
Mail list logo