Your message dated Fri, 04 Oct 2019 08:34:52 +0000
with message-id <e1igj36-000e3h...@fasolo.debian.org>
and subject line Bug#940080: fixed in wpa 2:2.9-2
has caused the Debian Bug report #940080,
regarding wpa: CVE-2019-16275: 2019-7: AP mode PMF disconnection protection 
bypass
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
940080: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940080
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: wpa
Version: 2:2.9-1
Severity: important
Tags: security upstream

Hi

See https://www.openwall.com/lists/oss-security/2019/09/11/7 and
https://w1.fi/security/2019-7/ for advisory and patches.

Please adjust affected versions as needed. Only verified sourcewise
unstable.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2:2.9-2

We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 940...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrej Shadura <andre...@debian.org> (supplier of updated wpa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 04 Oct 2019 10:11:47 +0200
Source: wpa
Architecture: source
Version: 2:2.9-2
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers <w...@packages.debian.org>
Changed-By: Andrej Shadura <andre...@debian.org>
Closes: 940080
Changes:
 wpa (2:2.9-2) unstable; urgency=medium
 .
   * SECURITY UPDATE:
     - AP mode PMF disconnection protection bypass.
       More details:
        + https://w1.fi/security/2019-7/
       Closes: #940080 (CVE-2019-16275)
Checksums-Sha1:
 8aa3172f44bef93978efd8e40f55eb2ce63e817c 2149 wpa_2.9-2.dsc
 5f29f5248340ad276a6d2adeac95219fa6b3afa9 82212 wpa_2.9-2.debian.tar.xz
Checksums-Sha256:
 1723a0cd27a38fa045ae3a2ba8160238da2e7374906feeffeb5c7c63f344a95f 2149 
wpa_2.9-2.dsc
 a7f99f56a1baf64e07f19fc83a0bb1f51f84d914bc12be8f5e32b78e23277e7e 82212 
wpa_2.9-2.debian.tar.xz
Files:
 dad624cb038da237618e66e91638c1ad 2149 net optional wpa_2.9-2.dsc
 af89e7daa21fa20109de52afec93912e 82212 net optional wpa_2.9-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEeuS9ZL8A0js0NGiOXkCM2RzYOdIFAl2W/4MACgkQXkCM2RzY
OdL7ewf7Bj0cHS8DQ2INOYmvjp39SRLU7PvmbD6wG0igcHXfA2UWl/0rsjzazg7Y
Ne6FQoJ7E8saZEcyYgYj5k+AeQK8VtLtErkzzXnIRsbXFl7esBv7njH05tlXZhFb
Sw5R56uOB9f3dtC1Nq1FVTYe+/TtJ9rtWywYtd1SWh5LG7mnvWFfOfaXeNajeAqn
c9BsHF+GsvMrwSbVMUwhRxgOfGuh2iJdiAOobwUHwU3OvzT4NKp+MW01fVLyDMT1
rKzeDl6L5uNRWLYTd1E0UxRn0AVkNg5g84++y0oUdDvw2MnaZFnVSI3yDMOJ1dkd
8KYUJOdwqHnL6qjgsZECe5ruBNOjog==
=o5xv
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to