-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi, > Package : radsecproxy Vulnerability : SSL certificate > verification weakness Problem type : remote Debian-specific: no > CVE ID : CVE-2012-4523 CVE-2012-4566 [...] > For the stable distribution (squeeze), these problems have been > fixed in version 1.4-1+squeeze1. The new package seems to be available only for i386. What about the other architectures? odenbach@re:/afs/uni-paderborn.de/public/apt/debian/security/pool/updates/main/r/radsecproxy$ l insgesamt 247 - -rw-r--r-- 1 man ntp 6491 6. Nov 11:30 radsecproxy_1.4-1+squeeze1.diff.gz - -rw-r--r-- 1 man ntp 1723 6. Nov 11:30 radsecproxy_1.4-1+squeeze1.dsc - -rw-r--r-- 1 man ntp 62556 6. Nov 11:30 radsecproxy_1.4-1+squeeze1_i386.deb - -rw-r--r-- 1 man ntp 179771 6. Nov 11:30 radsecproxy_1.4.orig.tar.gz Also have a look at http://packages.debian.org/squeeze/radsecproxy Is that intentionally? Christopher - -- ====================================================== Dipl.-Ing. Christopher Odenbach Zentrum fuer Informations- und Medientechnologien Universitaet Paderborn Raum N5.311 [email protected] Tel.: +49 5251 60 5315 ====================================================== -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iD8DBQFQoLNUhxiCJKeLY0IRAnqQAJ9dreaUBZ/K7QYNdSmajJq6rKcYRwCgrQLN oTz5EDt+ToAm4b5CZD3j8gc= =m+lk -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

