[Pkg-freeradius-maintainers] Bug#863673: marked as done (CVE-2017-9148: FreeRADIUS TLS resumption authentication bypass)
Debian Bug Tracking System
owner at bugs.debian.org
Tue May 30 16:06:05 UTC 2017
Your message dated Tue, 30 May 2017 16:03:47 +0000
with message-id <E1dFjcZ-0004M2-Hb at fasolo.debian.org>
and subject line Bug#863673: fixed in freeradius 3.0.12+dfsg-5
has caused the Debian Bug report #863673,
regarding CVE-2017-9148: FreeRADIUS TLS resumption authentication bypass
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)
--
863673: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863673
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Guido =?iso-8859-1?Q?G=FCnther?= <agx at sigxcpu.org>
Subject: CVE-2017-9148: FreeRADIUS TLS resumption authentication bypass
Date: Mon, 29 May 2017 23:16:29 +0200
Size: 2652
URL: <http://lists.alioth.debian.org/pipermail/pkg-freeradius-maintainers/attachments/20170530/026b54ab/attachment-0002.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Michael Stapelberg <stapelberg at debian.org>
Subject: Bug#863673: fixed in freeradius 3.0.12+dfsg-5
Date: Tue, 30 May 2017 16:03:47 +0000
Size: 6394
URL: <http://lists.alioth.debian.org/pipermail/pkg-freeradius-maintainers/attachments/20170530/026b54ab/attachment-0003.mht>
More information about the Pkg-freeradius-maintainers
mailing list