Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 8 Feb 2018 18:02:22 +0100
From: Heiko Schlittermann <hs@...littermann.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2018-6789 Exim 4.90 and earlier: buffer overflow

Heiko Schlittermann <hs@...littermann.de> (Do 08 Feb 2018 17:57:00 CET):
…
> > * t0:     Distros will get access to our "security" non-public git repo
> >           (based on the SSH keys known to us)
> > * t0 +7d: Patch will be published on the official public git repo
> > 
> > t0 will be around 2018-02-08.
> 
> t0 is now. Distro maintainers please use the following repo URLs:

We'll push the patch to our public Git repo on

    Thu 15. Feb 16:59:37 UTC 2018

    Best regards from Dresden/Germany
    Viele Grüße aus Dresden
    Heiko Schlittermann
-- 
 SCHLITTERMANN.de ---------------------------- internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --------------- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01 ------------ -

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.