From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 77151 invoked by alias); 26 Jun 2019 14:10:27 -0000 Mailing-List: contact bzip2-devel-help@sourceware.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Subscribe: List-Id: Sender: bzip2-devel-owner@sourceware.org Received: (qmail 77142 invoked by uid 89); 26 Jun 2019 14:10:27 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Checked: by ClamAV 0.100.3 on sourceware.org X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.8 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.1 spammy=HX-Languages-Length:304, March, ftp, H*r:sk:bzip2-d X-Spam-Status: No, score=-1.8 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on sourceware.org X-Spam-Level: X-HELO: mail-io1-f41.google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:reply-to:from:date:message-id:subject:to; bh=0YP9oQ2Pe6av4Py9zah8LgM0nJ+yHLORjtNjSS36YCA=; b=QJ0SFHA2n7o+erdAGw2nZo7jtrrJbU1vYvefK9t4+z7UKWsIBwhWNcnuGHuPLg8w8n 21CL4H1z2h4KsxGDcd5dJiaXb/gcpR87Ak2PLf9BOEuQ6kB/2MHJUZh7vpSvzC5M6qXJ DHMndJ3VJ7haxNY5ifx8xi/E3VXJguTtUmylkEIcmoA8dzOubPDIX2trwXcA5cCcSFej 7AKZhDosoKaA9kfar+PD1v3FEzmew41SnGCc7f1Q8YNbuZ7+TUfIdkq+xphaGDWIgJ9R ColAZ601bfXwQXl+uAFJBP/BW0Ych2+zwUIXAkGIrHwi+ZvD2d1/8jLlvqpQ2I8FwthV WiYQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:from:date:message-id :subject:to; bh=0YP9oQ2Pe6av4Py9zah8LgM0nJ+yHLORjtNjSS36YCA=; b=KNN2Be4Aq0GPp8mXtBf3ydHoiw3Da6fZFujhl6nVJsmMj868b/iBlVfQdwHsXwvqFN FdRpgYO/gqdfxLp5b99NQf5UgqfEVUUW6+uq32qYCR0alw67AMs4gtBXCzl0zcDVELFB 1pecQSrn27gzilFRVSieGu5bjuS1MJ5ywr5VgcKp3V/RVn/cCmYvlvOUv4j5NbvYWPfs /XpuVqkUPClZBqVN/6wgGFU2bdr0tB+p5Jde7zxYXaoWj5PhefIruESTy2A+Ahh3kOES Zr5cor0CG/KMYpIwP1ogL0w/JW2XaKOaP9iR8node0KIVtc6GuXZj+YpySxN6WQdIczn CeWA== X-Gm-Message-State: APjAAAWyJOBOxl+IO8RKILBLmUPzz82oOc0rv0W2MRAA3f7i1ETqQrgy 3QjDkoZo+lw6wuP4eOk0b4s6uJCJpOk2ZCwDtK1HP8SL X-Google-Smtp-Source: APXvYqwlyv8HbkSxo5hgZE/1U/HDvKGzh3Lx8xSMyk2EFx9fuIlLXxrv+jk+M/tyI+tvqAsVcecyfhWAG2Tkxrc5rvk= X-Received: by 2002:a6b:b987:: with SMTP id j129mr5433860iof.166.1561558224574; Wed, 26 Jun 2019 07:10:24 -0700 (PDT) MIME-Version: 1.0 Reply-To: noloader@gmail.com From: Jeffrey Walton Date: Tue, 01 Jan 2019 00:00:00 -0000 Message-ID: Subject: Bzip2 download and CVE-2019-12900 fix? To: bzip2-devel@sourceware.org Content-Type: text/plain; charset="UTF-8" X-SW-Source: 2019-q2/txt/msg00015.txt.bz2 Hi Everyone, Bzip2 downloads are available at ftp://sourceware.org/pub/bzip2/ . The download is 1.0.6 and dated March 2019. My question is, does the latest download include the fixes for CVE-2019-12900? If not, when can we expect a patch or new download? Jeff