Date: Fri, 08 Sep 2017 13:06:00 +0100 From: Denis Ovsienko <denis@...ienko.info> To: <oss-security@...ts.openwall.com> Cc: "the tcpdump group" <security@...dump.org> Subject: Arch Linux and tcpdump 4.9.2 Hello list. Let me clarify that neither Arch Linux nor any other distribution was the source of the leak. The original cause was a mishap by the tcpdump group, which resulted in an extra unintended copy in a public directory. From there the new tarball was picked up by automatic release monitoring systems and eventually packaged as a regular public update. In this case Arch Linux as well as other distributions have done exactly what was necessary to do and have provided their users with an updated package. Great job. tcpdump-4.9.2.tar.gz is now available at www.tcpdump.org. -- Denis Ovsienko
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ