lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 22 Apr 2014 17:25:02 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2911-1] icedove security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2911-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
April 22, 2014                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2014-1493 CVE-2014-1497 CVE-2014-1505 CVE-2014-1508 
                 CVE-2014-1510 CVE-2014-1511 CVE-2014-1512 CVE-2014-1513
                 CVE-2014-1514

Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail and news client. Multiple memory safety 
errors, out of bound reads, use-after-frees and other implementation 
errors may lead to the execution of arbitrary code, information 
disclosure or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 24.4.0-1~deb7u1. This updates Icedove to the Extended Support
Release (ESR) branch 24. An updated and compatible version of Enigmail 
is included with this update.

For the testing distribution (jessie), these problems have been fixed in
version 24.4.0esr-1.

For the unstable distribution (sid), these problems have been fixed in
version 24.4.0esr-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJTVomeAAoJEBDCk7bDfE42hcUQAJkYq5LRD5wblS28E1CXG5kN
jBFCP89UNdD7bErm63wAxL8hUJFzeOfK24sfPCumuNhIywzL8Riud7j5kBD6bHIV
VDYSfHwXrPA1rIfqcJskex7sTAjc0qm1v8T9npXoSaEZiO6x9u7R/bBlCNi7AK5u
V09LyeFrpDDBcEDzwN7UADHhL7YKcYwvQfCf83VaYL2VoQ0asozuqz4wptISpu6T
PZrys+THYUPX94fpWuOeBsQu21PHZUw5EaYMeLoc61Eewmix4Pf4sJsGh4ukSJg2
pW7Own/WBcz/dmhNSAj6Ru29XUEz9oWHx7BEX8iEtR+xK/PfI7dtzs8AAD3m6BO9
S7A1WiQDEtE60Sds+A1hQuQhF2V0RVMbDrDL8Vcny4NPJcD27ajp0/mEgJHgpfao
8d+xFnMZiLHH70iLpDlB2IKIkp2BY45IfvZE/0Xvx+aKiiPKIHQ3IuK001i/Lfx1
zbf6HLhxa7WR0RXT3QPWI8FA/pDikkLdeR40eDOQfLUJO9un3xGME6zn3V3k+nTo
No3g8QK3z42xMLIPzpmVMfwwynUVqLU5Xhn6JCsApqpl0IiIXiW6QP8mEuO9MBmJ
8wmN7/RUGntglKdKqVHECWad7KWcqhD9FrJDi54FsBDc87kl7JHu5efk8+h3gvYo
apbnKceAIcJykFL0nyRM
=9qpb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ