-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,

        Recently there's a security report about qmail-tls being
affected by the STARTTLS vulnerability found by Wietse Venema.

        http://www.vupen.com/english/advisories/2011/0612


        I just want to confirm if qmail-ldap is vulnerable too.
The patch seems to be trivial

        http://inoa.net/qmail-tls/vu555316.patch


        I can see that qmail-ldap uses a diferent flush() function,
but it would be great to listen from upstream. :)


Kind regards,
- -- 
Felipe Augusto van de Wiel <felipe.w...@complexopequenoprincipe.org.br>
Tecnologia da Informação (TI) - Complexo Pequeno Príncipe
http://www.pequenoprincipe.org.br/    T: +55 41 3310 1747
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=qAi0
-----END PGP SIGNATURE-----

Reply via email to