security fixes
Christoph Wickert
wickert at kolabsys.com
Mon May 30 14:01:37 CEST 2011
On Thursday 26 May 2011 18:38:54 Skip Morse wrote:
> I second that, I don't have an answer, but I'm interested too.
Sorry it took so long.
The postfix vulnerability mentioned earlier in this thread mail is scheduled
for kolab 2.3.2, which hopefully will be released tomorrow after some more
testing. We are doing a big update to postfix 2.8.3 and this requires more
testing in real world environments.
The same TLS problem in cyrus was already fixed in Kolab 2.3.1 as you can see
in [1] and [2].
Regards,
Christoph
[1] http://files.kolab.org/server/release/kolab-server-2.3.1/sources/release-
notes.txt
[2] https://bugzilla.kolabsys.com/show_bug.cgi?id=81
--
Christoph Wickert
Senior Engineer
Kolab Systems AG
Zürich, Switzerland
e: wickert at kolabsys.com
t: +49 251 871 369 77
w: http://kolabsys.com
pgp: 85DACC63 Christoph Wickert
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.kolab.org/pipermail/users/attachments/20110530/f7f6f9fa/attachment.sig>
More information about the users
mailing list