Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 4 Jun 2019 12:15:19 +0200
From: Heiko Schlittermann <hs@...littermann.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit

Hi,

our non-public security Git repo is

    ssh://git@....exim.org/exim.git

Access is granted to the known and trusted SSH keys we have.

The branch fix-CVE-2019-10149 contains the fix. It is one commit ahead
of the exim-4_91+fixes branch and we'll eventuelly merge it into the
+fixes branch.

The relevant commit is d740d2111f189760593a303124ff6b9b1f83453d and is
signed with my GPG key, the same key that signed this message.

If you need help backporting it to older releases, please do not
hesitate to contact us.

The planned CRD (coordinated release date) is 2019-06-11 10.00 UTC.
Please do not publish any package or source until this date.

    Best regards from Dresden/Germany
    Viele Grüße aus Dresden
    Heiko Schlittermann
--
 SCHLITTERMANN.de ---------------------------- internet & unix support -
 Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
 gnupg encrypted messages are welcome --------------- key ID: F69376CE -
 ! key id 7CBF764A and 972EAC9F are revoked since 2015-01 ------------ -

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.