Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160412091406.GB24278@beta.private.mielke.cc>
Date: Tue, 12 Apr 2016 05:14:06 -0400
From: Dave Mielke <dave@...lke.cc>
To: Sebastian Krahmer <krahmer@...e.com>
Cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE-Request for brltty auth bypass

[quoted lines by Sebastian Krahmer on 2016/04/12 at 09:49 +0200]

>I already contacted upstream (Cc) but so far no response.

I'm just awaiting the patch to be actually tested. It'll certainly be included 
as soon as I'm informed that the test has been successful. I apreciate your 
patch, and am also sure that you can appreciate my wanting to wait for it to be 
tested.

-- 
Dave Mielke           | 2213 Fox Crescent | The Bible is the very Word of God.
Phone: 1-613-726-0014 | Ottawa, Ontario   | http://Mielke.cc/bible/
EMail: Dave@...lke.cc | Canada  K2A 1H7   | http://FamilyRadio.org/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.