|
Message-ID: <20190904104649.GR3837@jumper.schlittermann.de>
Date: Wed, 4 Sep 2019 12:46:49 +0200
From: Heiko Schlittermann <hs@...littermann.de>
To: oss-security@...ts.openwall.com, Exim Users <exim-users@...m.org>,
Exim Announce <exim-announce@...m.org>
Subject: Re: CVE-2019-15846: Exim - local or remote attacker
can execute programs with root privileges.
Heiko Schlittermann <hs@...marc.schlittermann.de> (Mi 04 Sep 2019 11:22:48 CEST):
> *** Note: EMBARGO is still in effect! ***
> *** Distros must not publish any detail yet ***
As I saw blocked accesses to our security repo:
If you're entitled to access our non-public security repository, please
update your "remote". The git URL is now:
ssh://git@....exim.org/exim-security
ssh://git@....exim.org/exim-packages-security
(We addedd the -security suffix.)
Best regards from Dresden/Germany
Viele Grüße aus Dresden
Heiko Schlittermann
--
SCHLITTERMANN.de ---------------------------- internet & unix support -
Heiko Schlittermann, Dipl.-Ing. (TU) - {fon,fax}: +49.351.802998{1,3} -
gnupg encrypted messages are welcome --------------- key ID: F69376CE -
! key id 7CBF764A and 972EAC9F are revoked since 2015-01 ------------ -
Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.