lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200209231722.g8NHMHK84254@mailserver2.hushmail.com> From: mutex at hushmail.com (mutex@...hmail.com) Subject: (no subject) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 is there any more information on this "potential" remote vulnerability? fetchmail-6.1.0 (Sun Sep 22 18:31:23 EDT 2002), 21999 lines: * Updated French translation. * Stefan Esser's fix for potential remote vulnerability in multidrop mode. This is an important security fix! -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wloEARECABoFAj2PTckTHG11dGV4QGh1c2htYWlsLmNvbQAKCRBLR9YdGwjQEGCjAJ9j dQWGysbUyLbds8ov0c7trraFswCfSoAdWbhdWhiLD+QJTYnJBRZpz3Q= =LBY3 -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com