lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 19 Sep 2019 19:46:27 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4526-1] opendmarc security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4526-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 19, 2019                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : opendmarc
CVE ID         : CVE-2019-16378
Debian Bug     : 940081

It was discovered that OpenDMARC, a milter implementation of DMARC, is
prone to a signature-bypass vulnerability with multiple From: addresses.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.3.2-2+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 1.3.2-6+deb10u1.

We recommend that you upgrade your opendmarc packages.

For the detailed security status of opendmarc please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/opendmarc

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=gqNK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ