lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160811191615.GA30542@pisco.westfalen.local>
Date: Thu, 11 Aug 2016 21:16:15 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3647-1] icedove security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3647-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 11, 2016                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2016-2818

Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail client: Multiple memory safety errors may
lead to the execution of arbitrary code or denial of service.

For the stable distribution (jessie), this problem has been fixed in
version 1:45.2.0-1~deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 1:45.2.0-2.

For the unstable distribution (sid), this problem has been fixed in
version 1:45.2.0-2.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=RWMW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ