lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20141207190711.GA3717@pisco.westfalen.local>
Date: Sun, 7 Dec 2014 20:07:11 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3092-1] icedove security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3092-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 07, 2014                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2014-1587 CVE-2014-1590 CVE-2014-1592 CVE-2014-1593 
                 CVE-2014-1594

Multiple security issues have been found in Icedove, Debian's version of 
the Mozilla Thunderbird mail and news client: Multiple memory safety 
errors, buffer overflows, use-after-frees and other implementation errors
may lead to the execution of arbitrary code, the bypass of security 
restrictions or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 31.3.0-1~deb7u1.

For the upcoming stable distribution (jessie), these problems will be
fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 31.3.0-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MRHS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ