Re: [SECURITY] [DSA 2573-1] radsecproxy security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
> Package : radsecproxy Vulnerability : SSL certificate
> verification weakness Problem type : remote Debian-specific: no
> CVE ID : CVE-2012-4523 CVE-2012-4566
[...]
> For the stable distribution (squeeze), these problems have been
> fixed in version 1.4-1+squeeze1.
The new package seems to be available only for i386. What about the
other architectures?
odenbach@re:/afs/uni-paderborn.de/public/apt/debian/security/pool/updates/main/r/radsecproxy$
l
insgesamt 247
- -rw-r--r-- 1 man ntp 6491 6. Nov 11:30
radsecproxy_1.4-1+squeeze1.diff.gz
- -rw-r--r-- 1 man ntp 1723 6. Nov 11:30 radsecproxy_1.4-1+squeeze1.dsc
- -rw-r--r-- 1 man ntp 62556 6. Nov 11:30
radsecproxy_1.4-1+squeeze1_i386.deb
- -rw-r--r-- 1 man ntp 179771 6. Nov 11:30 radsecproxy_1.4.orig.tar.gz
Also have a look at http://packages.debian.org/squeeze/radsecproxy
Is that intentionally?
Christopher
- --
======================================================
Dipl.-Ing. Christopher Odenbach
Zentrum fuer Informations- und Medientechnologien
Universitaet Paderborn
Raum N5.311
odenbach@uni-paderborn.de
Tel.: +49 5251 60 5315
======================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
iD8DBQFQoLNUhxiCJKeLY0IRAnqQAJ9dreaUBZ/K7QYNdSmajJq6rKcYRwCgrQLN
oTz5EDt+ToAm4b5CZD3j8gc=
=m+lk
-----END PGP SIGNATURE-----
Reply to: