[Pkg-utopia-maintainers] Bug#930375: marked as done (CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass)
Debian Bug Tracking System
owner at bugs.debian.org
Tue Jun 11 19:30:09 BST 2019
Your message dated Tue, 11 Jun 2019 19:28:00 +0100
with message-id <20190611182800.GB8452 at espresso.pseudorandom.co.uk>
and subject line Re: Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
has caused the Debian Bug report #930375,
regarding CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)
--
930375: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930375
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Simon McVittie <smcv at debian.org>
Subject: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
Date: Tue, 11 Jun 2019 17:34:40 +0100
Size: 3817
URL: <http://alioth-lists.debian.net/pipermail/pkg-utopia-maintainers/attachments/20190611/7c8a856a/attachment-0002.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Simon McVittie <smcv at debian.org>
Subject: Re: Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
Date: Tue, 11 Jun 2019 19:28:00 +0100
Size: 1768
URL: <http://alioth-lists.debian.net/pipermail/pkg-utopia-maintainers/attachments/20190611/7c8a856a/attachment-0003.mht>
More information about the Pkg-utopia-maintainers
mailing list