Source: libpam-radius-auth
Version: 1.4.0-3
Severity: serious
Justification: should not be released in bullseye without active maintainer
libpam-radius-auth has been orphaned in Debian since several years and
QA maintained. It did had at least the CVE-2015-9542 security issue.
There are no packag
Processing commands for cont...@bugs.debian.org:
> severity 951396 grave
Bug #951396 {Done: Utkarsh Gupta } [src:libpam-radius-auth]
libpam-radius-auth: CVE-2015-9542
Severity set to 'grave' from 'important'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
951396:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 21 Feb 2020 13:25:27 +0100
Source: zope.security
Architecture: source
Version: 5.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Matthias Klose
Changes:
zope.security (5.1.0
zope.security_5.1.0-1_source.changes uploaded successfully to localhost
along with the files:
zope.security_5.1.0-1.dsc
zope.security_5.1.0.orig.tar.gz
zope.security_5.1.0-1.debian.tar.xz
zope.security_5.1.0-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host u
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 21 Feb 2020 15:47:11 +0530
Source: libpam-radius-auth
Architecture: source
Version: 1.4.0-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Utkarsh Gupta
Closes: 951396
Changes:
l
libpam-radius-auth_1.4.0-3_source.changes uploaded successfully to localhost
along with the files:
libpam-radius-auth_1.4.0-3.dsc
libpam-radius-auth_1.4.0-3.debian.tar.xz
libpam-radius-auth_1.4.0-3_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org
Your message dated Fri, 21 Feb 2020 10:49:29 +
with message-id
and subject line Bug#951396: fixed in libpam-radius-auth 1.4.0-3
has caused the Debian Bug report #951396,
regarding libpam-radius-auth: CVE-2015-9542
to be marked as done.
This means that you claim that the problem has been dealt
7 matches
Mail list logo