Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 08 Apr 2014 23:03:06 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Alan Coopersmith <alan.coopersmith@...cle.com>,
        oss-security@...ts.openwall.com
Subject: Re: Other instances of CVE-2014-0160 - mod_spdy from
 Google

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Also nodejs, fixed in github head, but older installs are vulnerable:

https://github.com/joyent/node/tree/master/deps/openssl/openssl

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Qtzg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ