Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 16 Oct 2015 15:42:48 +0200
From: Andreas Stieger <astieger@...e.com>
To: Agostino Sarubbo <ago@...too.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - LibreSSL (CVE-2015-5333
 and CVE-2015-5334)

Hello,

On 10/16/2015 12:06 PM, Agostino Sarubbo wrote:
> On Thursday 15 October 2015 17:54:16 Qualys Security Advisory wrote:
> > We would like to thank the LibreSSL team for their great work and
> > their incredibly quick response,
>
> Are these issues fixed upstream?
> If yes, is there a release which fixes the issues?
> If there isn't a release, do we have the link of the commit/diff?

One could check http://www.libressl.org/releases.html
> LibreSSL 2.2.4, 2.1.8, 2.0.6 (Oct 15, 2015)
> OpenBSD Errata
http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/007_obj2txt.patch.sig

Andreas

-- 
Andreas Stieger <astieger@...e.com>
Project Manager Security
SUSE Linux GmbH, GF: Felix Imend├Ârffer, Jane Smithard, Graham Norton,
HRB 21284 (AG N├╝rnberg)


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ