Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <347664F1-79BA-433D-BF04-1D015A074C84@apache.org>
Date: Mon, 9 May 2022 12:36:58 +0200
From: Jan Lehnardt <jan@...che.org>
To: Archange <archange@...ivis.me>
Cc: oss-security@...ts.openwall.com,
 Security CouchDB <security@...chdb.apache.org>
Subject: Re: CVE-2022-24706: Apache CouchDB: Remote Code
 Execution Vulnerability in Packaging


> On 9. May 2022, at 11:46, Archange <archange@...ivis.me> wrote:
> 
> Le 09/05/2022 à 13:41, Jan Lehnardt a écrit :
>> Hi Bruno,
>> 
>> first of all, thanks for maintaining CouchDB for Arch. Secondly, for any security related questions, please do not hesitate to contact security@...chdb.apache.org instead of any one of the team individually, as we can’t know if any of is available at all times (vacations and whatnot :)
> 
> Sure, you should put this address in copy when posting to oss-security then, so you would be sure people reply to that one too. ;)

This is automated by ASF infrastructure, I sadly have no say over this. But maybe we can a footer with the address next time :)

> 
>> As for your questions, see this PR to our packaging infrastructure for how we handle this on Debian and Centos/Rocky: https://github.com/apache/couchdb-pkg/pull/92/files
> 
> Thanks, so you use a default env file to set the variable and allow people to easily change it in the case of a clustered setup. Will do so as well then!
> 

Perfect, thanks!
Jan
—

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.