Am 06.05.21 um 20:53 schrieb Ludovic Bellière:
You mean this[1] package?
[1]:
https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=exim4=4.92-8+deb10u6
It's a platform independent ('all') package.
Look at
https://pkginfo.devuan.org/cgi-bin/policy-query.html?c=package&q=exim4-ba
Quoting marc (marc...@welz.org.za):
> > >
> > >> https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/
> > >>
> > > ..how it works:
> > > https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/
> >
> >
> > This backdoor is targetting systemd and gvfs.
>
> So the
Quoting Dr. Nikolaus Klepp (off...@klepp.biz):
> And there's alway the possibillity of 3rd party software, e.g. Teams,
> Appimages, ...
Always. Looking from a distro-management perspective, doing that falls
into the broad category of "User circumvents the distro's management
regime", and natural
> >
> >> https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/
> >>
> > ..how it works:
> > https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/
>
>
> This backdoor is targetting systemd and gvfs.
So the below words aren't directed at anybody in particular:
I
You mean this[1] package?
[1]:
https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=exim4=4.92-8+deb10u6
On jeu, 06 mai 2021, Thomas Besser via Dng wrote:
> Hi,
>
> asked this already in IRC on #devuan, but perhaps some devs are reading this
> here.
>
> Fixing 21Nails
> (https:/
Hi,
asked this already in IRC on #devuan, but perhaps some devs are reading
this here.
Fixing 21Nails
(https://blog.qualys.com/vulnerabilities-research/2021/05/04/21nails-multiple-vulnerabilities-in-exim-mail-server)
in exim4 seems to be urgent.
Debian buster-security has already exim4 4.9