On Tue, Jun 26, 2001 at 01:34:05PM -0500, Steve Langasek wrote: > This is wonderful news -- thank you very much for your work! There are > always so many things that need doing around Linux-PAM, that this is one task > that's been put off. oh, you're welcome :) I did it mainly for the security of non-RedHat users. > I will be taking a look at these patches, and I'm sure Andrew and others will > be doing so as well. > > Now then, how I can I sweet-talk you into doing the same for Debian fixes? :) ;) are you talking explicitly about Linux-PAM or general fixes for any package? Usually I don't do things like this, because there is always more important stuff to do (means for me: netfilter/iptables work). But if it comes to fixes for possible buffer overflows (even if not directly exploitable) to one of the most security relevant packages in any Linux syetem, I just couldn't hold myself. So if you suspect something like this for the debian Linux-PAM package, I might give it a look. But then, I thought debian people should have better behaviour wrt. back-contribution of fixes. > Regards, > Steve Langasek > postmodern programmer -- Live long and prosper - Harald Welte / laforge@gnumonks.org http://www.gnumonks.org/ ============================================================================ GCS/E/IT d- s-: a-- C+++ UL++++$ P+++ L++++$ E--- W- N++ o? K- w--- O- M- V-- PS+ PE-- Y+ PGP++ t++ 5-- !X !R tv-- b+++ DI? !D G+ e* h+ r% y+(*)