Your message dated Thu, 25 Sep 2014 15:29:41 +0000
with message-id <[email protected]>
and subject line Bug#762749: fixed in python-keystoneclient 1:0.10.1-2
has caused the Debian Bug report #762749,
regarding [CVE-2014-7144] TLS cert verification option not honored in paste 
configs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
762749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762749
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: python-keystoneclient
Severity: important
Tags: security upstream patch fixed-upstream

Hi there,
    the following vulnerabilities were published for python-keystoneclient:

CVE-2014-7144: TLS cert verification option not honored in paste configs

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:
http://seclists.org/oss-sec/2014/q3/620
https://review.openstack.org/#/c/113191/

Please adjust the affected versions in the BTS as needed. Can you please 
confirm 
to the security-team if the stable version is affected?

Regards, luciano

--- End Message ---
--- Begin Message ---
Source: python-keystoneclient
Source-Version: 1:0.10.1-2

We believe that the bug you reported is fixed in the latest version of
python-keystoneclient, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand <[email protected]> (supplier of updated python-keystoneclient 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 25 Sep 2014 20:30:57 +0800
Source: python-keystoneclient
Binary: python-keystoneclient
Architecture: source all
Version: 1:0.10.1-2
Distribution: unstable
Urgency: high
Maintainer: PKG OpenStack <[email protected]>
Changed-By: Thomas Goirand <[email protected]>
Description:
 python-keystoneclient - client library for the OpenStack Keystone API
Closes: 762749
Changes:
 python-keystoneclient (1:0.10.1-2) unstable; urgency=high
 .
   * Uploading to unstable.
   * Added CVE-2014-7144_Fix_the_condition_expression_for_ssl_insecure.patch,
     (Closes: #762749).
Checksums-Sha1:
 76245465f1ac62f8d22425249a1adfee6d03bc53 2899 
python-keystoneclient_0.10.1-2.dsc
 4b3a23671bd545d23242f73928d8efb1b021ede3 28412 
python-keystoneclient_0.10.1-2.debian.tar.xz
 6b0b609fe75e7f4b4a92aed4b5772cc9042eb584 412538 
python-keystoneclient_0.10.1-2_all.deb
Checksums-Sha256:
 49e0477024ee3ae1e5633f5521c278132aeabcd1bc7ac130b0ceb5eedb14dfc4 2899 
python-keystoneclient_0.10.1-2.dsc
 5e49eae275380e880a389bf712e52de7248ac1b91245f6fcf4808d3e9c2593e7 28412 
python-keystoneclient_0.10.1-2.debian.tar.xz
 1207d3d470b8a6eb1eae3d85fedabd091cf6a074ad501b6d3cbda3811ca055b4 412538 
python-keystoneclient_0.10.1-2_all.deb
Files:
 73b032012342d2a68189be8613370a77 412538 python extra 
python-keystoneclient_0.10.1-2_all.deb
 95883a4de81b263fe3d9bf9547716cfb 2899 python extra 
python-keystoneclient_0.10.1-2.dsc
 6c7c6a080b808c974799fe87cfd37afd 28412 python extra 
python-keystoneclient_0.10.1-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=nr9f
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to