From debbugs-submit-bounces@debbugs.gnu.org Wed Aug 08 11:37:55 2018 Received: (at submit) by debbugs.gnu.org; 8 Aug 2018 15:37:55 +0000 Received: from localhost ([127.0.0.1]:45244 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fnQX0-0006Fc-V7 for submit@debbugs.gnu.org; Wed, 08 Aug 2018 11:37:54 -0400 Received: from eggs.gnu.org ([208.118.235.92]:37961) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fnQWy-0006FM-TE for submit@debbugs.gnu.org; Wed, 08 Aug 2018 11:37:50 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1fnQWs-0007WB-3I for submit@debbugs.gnu.org; Wed, 08 Aug 2018 11:37:43 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,T_DKIM_INVALID autolearn=disabled version=3.3.2 Received: from lists.gnu.org ([2001:4830:134:3::11]:34462) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1fnQWr-0007W3-VH for submit@debbugs.gnu.org; Wed, 08 Aug 2018 11:37:42 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:57153) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1fnQWp-00074A-Qd for guix-patches@gnu.org; Wed, 08 Aug 2018 11:37:41 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1fnQWm-0007LV-Mm for guix-patches@gnu.org; Wed, 08 Aug 2018 11:37:39 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:45529) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1fnQWm-0007KS-G3 for guix-patches@gnu.org; Wed, 08 Aug 2018 11:37:36 -0400 Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id D25C321E81; Wed, 8 Aug 2018 11:37:35 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Wed, 08 Aug 2018 11:37:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=date:from:message-id:subject:to:x-me-sender:x-me-sender :x-sasl-enc; s=mesmtp; bh=oVrBE/ZdsyzgO+WSSYHK0NJ9H/Q/PV48egCM2k FaLqo=; b=wYOUvtY4uVsW51yC9oIwBlaDldr0//hUx/iMbMIeCPm3hJcanT9rXB PAkaUoaab1mdoo4D9xON5ns+xca/FOVcUThEK4WufxGIZLynp4fOJtpPDlggfO/u HBZ1QcOLwu13DicjLPLJNUY74mfkbSc2xmv3KT7277NbbJpBMXMyU= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=date:from:message-id:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=oVrBE/ZdsyzgO+WSS YHK0NJ9H/Q/PV48egCM2kFaLqo=; b=crmmb2Ej3dZuLi5tIhETUaeWQj2A4DQpn /Mp7AiFd82eLN0CmM5Tlor6pxu+i+lGGnlzTPk1OFA/c1vRMZ7TuMQz2GUNiVMLX iL82gxVvr1F34y8OgpJJu+KhlJIRkn/Zj0EM0hxUAY660WWfJJTwnqpZqYRbKPHk t1Vlekso/l0L1MQ65uY/FuOMPVUOjxUktWnxOOt47m3XdgS60hVnq40wWPEZf/Qe Qg8YaGU1aD148oK5eztrn/NI2GBU9e0lt6/TwO1CNx2c5zc4EJXhLl4pkNgQS0Qf 8+V6lyd2qOwPdBHzeW5OT4BdHCk6u67FuhQO4LqpGSLCJRp+hYU8A== X-ME-Proxy: X-ME-Sender: Received: from jasmine.lan (unknown [128.64.129.14]) by mail.messagingengine.com (Postfix) with ESMTPA id 3E692E4116 for ; Wed, 8 Aug 2018 11:37:35 -0400 (EDT) From: Leo Famulari To: guix-patches@gnu.org Subject: [PATCH] gnu: wpa_supplicant: Fix CVE-2018-14526. Date: Wed, 8 Aug 2018 11:37:25 -0400 Message-Id: X-Mailer: git-send-email 2.18.0 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x X-Received-From: 2001:4830:134:3::11 X-Spam-Score: -4.1 (----) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -5.1 (-----) I've built all the wpa_supplicant packages but don't have a way to test this change. * gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. * gnu/packages/admin.scm (wpa-supplicant-minimal)[source]: Use it. --- gnu/local.mk | 1 + gnu/packages/admin.scm | 1 + .../wpa-supplicant-CVE-2018-14526.patch | 53 +++++++++++++++++++ 3 files changed, 55 insertions(+) create mode 100644 gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch diff --git a/gnu/local.mk b/gnu/local.mk index ef28cf032..6fd0d40fb 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1213,6 +1213,7 @@ dist_patch_DATA = \ %D%/packages/patches/wordnet-CVE-2008-3908-pt1.patch \ %D%/packages/patches/wordnet-CVE-2008-3908-pt2.patch \ %D%/packages/patches/wpa-supplicant-CVE-2017-13082.patch \ + %D%/packages/patches/wpa-supplicant-CVE-2018-14526.patch \ %D%/packages/patches/wpa-supplicant-fix-key-reuse.patch \ %D%/packages/patches/wpa-supplicant-fix-zeroed-keys.patch \ %D%/packages/patches/wpa-supplicant-fix-nonce-reuse.patch \ diff --git a/gnu/packages/admin.scm b/gnu/packages/admin.scm index 73772166a..edc1349c4 100644 --- a/gnu/packages/admin.scm +++ b/gnu/packages/admin.scm @@ -1048,6 +1048,7 @@ commands and their arguments.") version ".tar.gz")) (patches (search-patches "wpa-supplicant-CVE-2017-13082.patch" + "wpa-supplicant-CVE-2018-14526.patch" "wpa-supplicant-fix-key-reuse.patch" "wpa-supplicant-fix-zeroed-keys.patch" "wpa-supplicant-fix-nonce-reuse.patch" diff --git a/gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch b/gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch new file mode 100644 index 000000000..d3d5cbc46 --- /dev/null +++ b/gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch @@ -0,0 +1,53 @@ +Fix CVE-2018-14526: + +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526 +https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt + +Patch downloaded from upstream: + +https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch + +From 3e34cfdff6b192fe337c6fb3f487f73e96582961 Mon Sep 17 00:00:00 2001 +From: Mathy Vanhoef +Date: Sun, 15 Jul 2018 01:25:53 +0200 +Subject: [PATCH] WPA: Ignore unauthenticated encrypted EAPOL-Key data + +Ignore unauthenticated encrypted EAPOL-Key data in supplicant +processing. When using WPA2, these are frames that have the Encrypted +flag set, but not the MIC flag. + +When using WPA2, EAPOL-Key frames that had the Encrypted flag set but +not the MIC flag, had their data field decrypted without first verifying +the MIC. In case the data field was encrypted using RC4 (i.e., when +negotiating TKIP as the pairwise cipher), this meant that +unauthenticated but decrypted data would then be processed. An adversary +could abuse this as a decryption oracle to recover sensitive information +in the data field of EAPOL-Key messages (e.g., the group key). +(CVE-2018-14526) + +Signed-off-by: Mathy Vanhoef +--- + src/rsn_supp/wpa.c | 11 +++++++++++ + 1 file changed, 11 insertions(+) + +diff -upr wpa_supplicant-2.6.orig/src/rsn_supp/wpa.c wpa_supplicant-2.6/src/rsn_supp/wpa.c +--- wpa_supplicant-2.6.orig/src/rsn_supp/wpa.c 2016-10-02 21:51:11.000000000 +0300 ++++ wpa_supplicant-2.6/src/rsn_supp/wpa.c 2018-08-08 16:55:11.506831029 +0300 +@@ -2016,6 +2016,17 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, c + + if ((sm->proto == WPA_PROTO_RSN || sm->proto == WPA_PROTO_OSEN) && + (key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) { ++ /* ++ * Only decrypt the Key Data field if the frame's authenticity ++ * was verified. When using AES-SIV (FILS), the MIC flag is not ++ * set, so this check should only be performed if mic_len != 0 ++ * which is the case in this code branch. ++ */ ++ if (!(key_info & WPA_KEY_INFO_MIC)) { ++ wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, ++ "WPA: Ignore EAPOL-Key with encrypted but unauthenticated data"); ++ goto out; ++ } + if (wpa_supplicant_decrypt_key_data(sm, key, ver, key_data, + &key_data_len)) + goto out; -- 2.18.0 From debbugs-submit-bounces@debbugs.gnu.org Thu Aug 09 16:32:19 2018 Received: (at 32402) by debbugs.gnu.org; 9 Aug 2018 20:32:19 +0000 Received: from localhost ([127.0.0.1]:46184 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fnrbW-00085M-PB for submit@debbugs.gnu.org; Thu, 09 Aug 2018 16:32:18 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:49639) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fnrbV-00085D-DB for 32402@debbugs.gnu.org; Thu, 09 Aug 2018 16:32:17 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 4CE8621C4F; Thu, 9 Aug 2018 16:32:17 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Thu, 09 Aug 2018 16:32:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.com; h= content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=KC6tSy1CB89vjuige0piHUGFsOZViwQEQuDLbkPd/Fs=; b=s4HlIE2s kAtqzwbas8BPMBU0AicjQUEJ7V81WiCpXyWPkq5+F1cm3l/OSjGgO4J7s1cGC5iB C0aEEsb8yIlf4TrN2ESVlGu4SReyH2BtRGTE1rtnx7Vl3eFMTH58MFhKeB2boPr7 y24esUtY6tq+VYcD/RIr7tPLwMukTjdbQHs+ZmS6Iae8diWDToPDAnw54S8jpNVK 7ykWnXdyDOhpvU6kEd8JlLHHArPROmsPsmuRkDklgi4lW7Sq9rkJScACW1x0Egza 3xrYfZgT+mvNFi7WYV3k6Q9TZS7zets7PBXE2XAzcZz6MFpSWNGqaK9mcPtUwk+9 ndQJrkAefRWh0w== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=KC6tSy1CB89vjuige0piHUGFsOZVi wQEQuDLbkPd/Fs=; b=BJkNJFG2smHxNh5xEhGIdmYaXExsMcEwhljnCuaItzA9O e/yR9zoerrQ3WUK3a43q+Vb1EkRQLScYjnBsuvL7PFxPFkTfbRaZpqM+uUqDfoW+ enTwUi1kOdJEXMwkSonlQ9Z9eynAPQNhFkGdYKvSJNjlIi3PEtdoiW4bNfCikQhq +z96fmjc6eV+0PWkYjfH9dnYgrU0UL+aak8l2aF0a3N09jhgvuoo2dj6LfliMYQ1 YLdlLZuiibSiaFxCfxboLWHiMFTo8DPi3GlGcNyHFCSBEVLXjsqTPgiO8NH3a5Qg HNTdsYLV7g7FcUE4ElFhM9CA+mONSOZH2CKHhXdMQ== X-ME-Proxy: X-ME-Sender: Received: from localhost (95.92-221-151.customer.lyse.net [92.221.151.95]) by mail.messagingengine.com (Postfix) with ESMTPA id AADC6E4512; Thu, 9 Aug 2018 16:32:16 -0400 (EDT) From: Marius Bakke To: Leo Famulari , 32402@debbugs.gnu.org Subject: Re: [bug#32402] [PATCH] gnu: wpa_supplicant: Fix CVE-2018-14526. In-Reply-To: References: User-Agent: Notmuch/0.27 (https://notmuchmail.org) Emacs/26.1 (x86_64-pc-linux-gnu) Date: Thu, 09 Aug 2018 22:32:15 +0200 Message-ID: <874lg3b7sg.fsf@fastmail.com> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 32402 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) --=-=-= Content-Type: text/plain Leo Famulari writes: > I've built all the wpa_supplicant packages but don't have a way to test > this change. > > * gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch: New file. > * gnu/local.mk (dist_patch_DATA): Add it. > * gnu/packages/admin.scm (wpa-supplicant-minimal)[source]: Use it. I haven't tested this yet, but looks good to me! You'll be the first to know if my wifi breaks ;-) --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEu7At3yzq9qgNHeZDoqBt8qM6VPoFAltspM8ACgkQoqBt8qM6 VPo7BggAoAjZMcigBANYK467kqQZlcw3VaGIXisE6cMSBb5/BCkM39Mocs/Le1Nj pmIeKqH/rFRsiR/v+LzcJohsi7HEesmVFdoXaaL2/zv9Gs1kvXd2RpnV+V3RGiKN DZDK4HM+tM7l6Uk9U+wrlOx4Z3KS7IbJFVeLSbjiZsvi+rcQbo2U3yD8dcECrc/O RWk8qH7TKyOwMqVYnrmCTC2iLrDftyrLNzIocjx9bCnF2ATWZv3njso1kx0bvpzl VzbvFglWBoJeXftN0SsC9Y77O1Ohtlhk+0FWNgHvROwR+6r+8bL5UnkuIi5K43T3 WEl/0/+q0tpkJHPOabksO7cfEMN7PQ== =ulcP -----END PGP SIGNATURE----- --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Thu Aug 09 18:22:27 2018 Received: (at 32402-done) by debbugs.gnu.org; 9 Aug 2018 22:22:27 +0000 Received: from localhost ([127.0.0.1]:46218 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fntK5-0002SK-PU for submit@debbugs.gnu.org; Thu, 09 Aug 2018 18:22:25 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:41371) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fntK2-0002SA-OE for 32402-done@debbugs.gnu.org; Thu, 09 Aug 2018 18:22:24 -0400 Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 95EDA21B01; Thu, 9 Aug 2018 18:22:22 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Thu, 09 Aug 2018 18:22:22 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=cc:content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= mesmtp; bh=OCgZU7EuYGdQSFSfY0XfxqPDgIL+6Y12hWrtCNiCzF8=; b=sjQ1y s7xLW9KG43ZsMAeYeVbDl1fuAA0o8QETGu0B/7zITwx9GTjbe96pZ5SylnLuLHbT QZROgPdcDnhwJHD/d+5ry0YOlDdZHBA/K3uGN+1cjwpC3ihnpujbxIEhIbCpbRVf /ts/SyMcTJ24E7vlyU/ptSuKPCDL4JfIQiXNRE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=OCgZU7EuYGdQSFSfY0XfxqPDgIL+6 Y12hWrtCNiCzF8=; b=XrY2FxN8939C9rSpSRFffpRM2/6KU45YLQh+bq1GpGNfa LZCqS4f8rM+H5iv6F0TNreryA+ueMQiwBWqA3tfohb/S1KOX/Nb7sb63Y7Sx1qdp 5S9drAK+Q911VUD2xH2cs28MmjuQbGXttmml9ySlSQQIIqBHa0L5ZVbsX41Q+TZZ yguyi6YhRAX7uITMcYVYNlEk82RuDj/wmaTLii+tdEdUt7M3+Z1uGLUkmBBT5olB R7OaRxcH8TtbVuaBOe7ueWZ7QQt0br5bunAC8CYuGvUO0UlpC0E9xlkqWbfqYjHn OvjZ6jEtMRZwyv/8OpYG3HbfRhZc3daGi53IwQK+w== X-ME-Proxy: X-ME-Sender: Received: from localhost (c-76-124-202-137.hsd1.pa.comcast.net [76.124.202.137]) by mail.messagingengine.com (Postfix) with ESMTPA id 3EF8310288; Thu, 9 Aug 2018 18:22:22 -0400 (EDT) Date: Thu, 9 Aug 2018 18:22:21 -0400 From: Leo Famulari To: Marius Bakke Subject: Re: [bug#32402] [PATCH] gnu: wpa_supplicant: Fix CVE-2018-14526. Message-ID: <20180809222221.GA7733@jasmine.lan> References: <874lg3b7sg.fsf@fastmail.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="bp/iNruPH9dso1Pn" Content-Disposition: inline In-Reply-To: <874lg3b7sg.fsf@fastmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 32402-done Cc: 32402-done@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) --bp/iNruPH9dso1Pn Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Aug 09, 2018 at 10:32:15PM +0200, Marius Bakke wrote: > Leo Famulari writes: >=20 > > I've built all the wpa_supplicant packages but don't have a way to test > > this change. > > > > * gnu/packages/patches/wpa-supplicant-CVE-2018-14526.patch: New file. > > * gnu/local.mk (dist_patch_DATA): Add it. > > * gnu/packages/admin.scm (wpa-supplicant-minimal)[source]: Use it. >=20 > I haven't tested this yet, but looks good to me! You'll be the first to > know if my wifi breaks ;-) I was finally able to test it. Works for me, pushed as 4e23e8d80913fc2a69e97b29b5640e745b0d550b --bp/iNruPH9dso1Pn Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEsFFZSPHn08G5gDigJkb6MLrKfwgFAltsvpwACgkQJkb6MLrK fwixYxAA1e3+kiAJ4FVWlBIlKXv6X18zfiG64ejoORPHEzN6zeboc439X0gzAMvX +AIwAjaxVnWQX5QTONm11vYFoP2JbprK/p2PVg3Q31CUQ2thlkBONOCPOMx5avfG 5rcLKvJh6s6q4sjVuhKo5F2BddG2nvQd71Y2m+1Rc0wtES1T/wY2a36CUeY5nWkF HvGr80hAyiX0r0lafbMO5gscokZ0lIu5bwIcGx9LDpBlN5HSF3S91qWz/aS21M/U WijTGtpn0C+SMHNbNlE8xB+nV3wuUKHhVsZ5P+6hwFdav9jsTOzwNzIaBsKfTq4l 8iuKJ68dPt8pwVWHX8gS87nnoLocWUHGU5QufevFBWoKMCcpHiVtHhac//rS1tlB kyikh+k9+rKPbH5Y6Ua0dB2270JqSYg9azL+NPi+J5xrDFrD52A2bvDr9yt9N5Gd 3AcsDACXoCB/GCoajPPWrrXzzR+WZA4z5HYWNAZZCeDQd/4JUipUP7i/B1PTfE+6 pmnw3Mo1jlqw3z9cA6dhtCzGxcqJhv90CEMWHBzL47B298VbpxAZLZ110p4x5hmr na+MHwHnwB4vPf0pDN2MZEWijjXKlq28MYiUiBdiBmF/69REW0JQ88ZURekeU6pl PujTxb/YiKvEafzwKEGp2FfOCxgX2wfU8uGYLGFauMyYoDjK4Jw= =8+B4 -----END PGP SIGNATURE----- --bp/iNruPH9dso1Pn-- From unknown Fri Jun 20 19:48:16 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Fri, 07 Sep 2018 11:24:04 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator