[14:49] <rak> This remotely executable arbitrary command execution vulnerability has affected 16.04 since February. In case it's fallen through the cracks: https://bugs.launchpad.net/ubuntu/+source/opensmtpd/+bug/1864707
[14:49] <ubot3> Launchpad bug 1864707 in opensmtpd (Ubuntu Xenial) "arbitrary command execution vulnerability" [Critical, Confirmed]
[22:10] <ItzSwirlz> Hey sil2100, what should we do in the case of uhm... it was a confirmed issue earlier in the past and now the problem is fixed? I haven't used my proposed changes yet. Should we either a) discard it to avoid regression risk or b) import it in for stability if i QA test the patch?
[22:21] <RikMills> ItzSwirlz: he isn't in here at the moment, and most canonical people will be on leave until after the holidays
[23:06] <ItzSwirlz> alr