Hi,
On Wed, Jul 14, 2021 at 10:07:23PM +0200, Oxan van Leeuwen wrote:
> Hi Salvatore,
>
> Sorry for the delay in getting back to you.
No worries!
> On 05-07-2021 21:47, Salvatore Bonaccorso wrote:
> > I think we can do the following action plan, let me know if you agree:
> > The release btw is
Hi Salvatore,
Sorry for the delay in getting back to you.
On 05-07-2021 21:47, Salvatore Bonaccorso wrote:
I think we can do the following action plan, let me know if you agree:
The release btw is not yet fully missed, so I would suggest: upload a
very targetted fix aimed for bullseye to unstab
Hi,
On 29-06-2021 07:41, Salvatore Bonaccorso wrote:
The following vulnerability was published for postsrsd.
CVE-2021-35525[0]:
Thanks for the report, I've unfortunately missed this release. Do you
want to fix this through a DSA, or should I prepare&upload a stable (and
bullseye) update?
Hi Oxan,
On Mon, Jul 05, 2021 at 06:03:10PM +0200, Oxan van Leeuwen wrote:
> Hi,
>
> On 29-06-2021 07:41, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for postsrsd.
> >
> > CVE-2021-35525[0]:
>
> Thanks for the report, I've unfortunately missed this release. Do you
Source: postsrsd
Version: 1.10-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for postsrsd.
CVE-2021-35525[0]:
| PostSRSd before 1.11 allows a denial of service (subprocess hang) if
| Postfix send
5 matches
Mail list logo