Hi Brian,
Ok thats something reasonably easy to reproduce unlike the zillion
different upgrade paths which are tricky. Ill load one up and see what I
get.
- Craig
On Sun, 21 Aug 2016, 12:56 PM Brian May wrote:
> Craig Small writes:
>
> > Just to be clear,
The problem with a blank screen means basically something went wrong, with
that level of usefullness. So it could be the exact same problem OR it
could be something completely different.
Just to be clear, you installed 3.6.1+dfsg-1~deb7u1 from a clean system and
had problems?
- Craig
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 20 Aug 2016 17:40:02 +0100
Source: cracklib2
Binary: libcrack2 libcrack2-dev cracklib-runtime python-cracklib
python3-cracklib
Architecture: source amd64
Version: 2.8.19-3+deb7u1
Distribution: wheezy-security
Urgency: high
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: cracklib2
Version: 2.8.19-3+deb7u1
CVE ID : CVE-2016-6318
Debian Bug : 834502
It was discovered that there was a stack-based buffer overflow when
parsing large GECOS fields in cracklib2, a pro-active password
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 20 Aug 2016 15:35:45 +0100
Source: suckless-tools
Binary: suckless-tools
Architecture: source amd64
Version: 38-2+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Vasudev Kamath
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Package: suckless-tools
Version: 38-2+deb7u1
CVE ID : CVE-2016-6866
It was discovered that the slock screen locking tool would segfault when the
user's account had been disabled.
slock called crypt(3) and used the return