security fixes

Christoph Wickert wickert at kolabsys.com
Mon May 30 14:01:37 CEST 2011


On Thursday 26 May 2011 18:38:54 Skip Morse wrote:
> I second that, I don't have an answer, but I'm interested too.

Sorry it took so long.

The postfix vulnerability mentioned earlier in this thread mail is scheduled 
for kolab 2.3.2, which hopefully will be released tomorrow after some more 
testing. We are doing a big update to postfix 2.8.3 and this requires more 
testing in real world environments.

The same TLS problem in cyrus was already fixed in Kolab 2.3.1 as you can see 
in [1] and [2].

Regards,
Christoph

[1] http://files.kolab.org/server/release/kolab-server-2.3.1/sources/release-
notes.txt
[2] https://bugzilla.kolabsys.com/show_bug.cgi?id=81

-- 
Christoph Wickert
Senior Engineer

Kolab Systems AG
Zürich, Switzerland

e: wickert at kolabsys.com
t: +49 251 871 369 77
w: http://kolabsys.com

pgp: 85DACC63 Christoph Wickert
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.kolab.org/pipermail/users/attachments/20110530/f7f6f9fa/attachment.sig>


More information about the users mailing list