Your message dated Mon, 22 Apr 2013 21:16:42 +0000
with message-id <e1uuo6m-0004qq...@franck.debian.org>
and subject line Bug#702267: fixed in stunnel4 3:4.53-1.1
has caused the Debian Bug report #702267,
regarding stunnel: CVE-2013-1762 buffer overflow in NTLM authentication of the 
CONNECT protocol negotiation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
702267: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702267
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: stunnel
Severity: grave
Tags: security

Hi,
the following vulnerability was published for stunnel.

Please see https://www.stunnel.org/CVE-2013-1762.html for details.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762
    http://security-tracker.debian.org/tracker/CVE-2013-1762

Please adjust the affected versions in the BTS as needed.


-- 
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0AAAA

Attachment: pgpGe2BWKjtsV.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: stunnel4
Source-Version: 3:4.53-1.1

We believe that the bug you reported is fixed in the latest version of
stunnel4, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 702...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated stunnel4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 22 Apr 2013 19:47:34 +0200
Source: stunnel4
Binary: stunnel4
Architecture: source amd64
Version: 3:4.53-1.1
Distribution: unstable
Urgency: high
Maintainer: Luis Rodrigo Gallardo Cruz <rodr...@debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Description: 
 stunnel4   - Universal SSL tunnel for network daemons
Closes: 702267
Changes: 
 stunnel4 (3:4.53-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Add CVE-2013-1762.patch patch.
     CVE-2013-1762: Fix buffer overflow in NTLM authentication of the CONNECT
     protocol negotiation. (Closes: #702267)
Checksums-Sha1: 
 4b9c83a9fcfb9f852df7fef11fa11d099f0a454a 1911 stunnel4_4.53-1.1.dsc
 aa808f8b37dd7602555111a7334f7daf2066a90b 32834 stunnel4_4.53-1.1.debian.tar.gz
 5aeaa7aed02ff1038a6892b6f2c7aa9fe5769a71 178460 stunnel4_4.53-1.1_amd64.deb
Checksums-Sha256: 
 9c6d4a47a42eb8ae24a51b04f24c14d0ffe36b824bda0e8cf2771dc9500b118c 1911 
stunnel4_4.53-1.1.dsc
 c00f52dfeaef48e41f7065e99575cfe7ac8be5ea21ab7dab0e0c464a08a753da 32834 
stunnel4_4.53-1.1.debian.tar.gz
 7d2c5751f994e6f7f99585aee3da42af80ae0058e1eac5413f6704bd0d814e41 178460 
stunnel4_4.53-1.1_amd64.deb
Files: 
 b3ee7b47c0f1f41a70935ac2ffa53391 1911 net optional stunnel4_4.53-1.1.dsc
 dba1136ca101247a08e009a2fe63476b 32834 net optional 
stunnel4_4.53-1.1.debian.tar.gz
 8bf9a88ac93838a9eef40831c9d77a37 178460 net optional 
stunnel4_4.53-1.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=Le4K
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to