lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1ZnoLL-0003Vt-P9@master.debian.org>
Date: Sun, 18 Oct 2015 13:49:47 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3373-1] owncloud security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3373-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 18, 2015                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : owncloud
CVE ID         : CVE-2015-4716 CVE-2015-4717 CVE-2015-4718 CVE-2015-5953 
                 CVE-2015-5954 CVE-2015-6500 CVE-2015-6670 CVE-2015-7699
Debian Bug     : 800126

Multiple vulnerabilities were discovered in ownCloud, a cloud storage
web service for files, music, contacts, calendars and many more. These
flaws may lead to the execution of arbitrary code, authorization bypass,
information disclosure, cross-site scripting or denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 7.0.4+dfsg-4~deb8u3.

For the testing distribution (stretch), these problems have been fixed
in version 7.0.10~dfsg-2 or earlier versions.

For the unstable distribution (sid), these problems have been fixed in
version 7.0.10~dfsg-2 or earlier versions.

We recommend that you upgrade your owncloud packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TkN9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ