Your message dated Wed, 30 May 2018 19:46:08 +0200
with message-id 
<53a29376db84f8378ecd68ce21d35ba4.squir...@aphrodite.kinkhorst.nl>
and subject line fixed in libapache2-mod-auth-cas 1.1-3 
has caused the Debian Bug report #858992,
regarding libapache2-mod-auth-cas: Please migrate to openssl1.1 in buster
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
858992: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858992
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libapache2-mod-auth-cas
Version: 1.1-2
Severity: grave
Tags: sid stretch

Hi,

Please use ssl1.0 for stretch.

We have requested the curl also reverts to ssl1.0 (please see
#850880). Since libapache2-mod-auth-cas is using a curl function exposing
SSL_CTX, it will have to use the same version libssl as curl itself.

Thanks,
~Niels

--- End Message ---
--- Begin Message ---
Version: 1.1-3

This has been fixed in the upload of 1.1-3 of today.


Cheers,
Thijs

--- End Message ---

Reply via email to