lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20180401203047.GA410@pisco.westfalen.local>
Date: Sun, 1 Apr 2018 22:30:47 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4162-1] irssi security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4162-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 01, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : irssi
CVE ID         : CVE-2018-5205 CVE-2018-5206 CVE-2018-5207 CVE-2018-5208 
                 CVE-2018-7050 CVE-2018-7051 CVE-2018-7052 CVE-2018-7053 
                 CVE-2018-7054

Multiple vulnerabilities have been discovered in Irssi, a terminal-based
IRC client which can result in denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 1.0.7-1~deb9u1.

We recommend that you upgrade your irssi packages.

For the detailed security status of irssi please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/irssi

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlrBQPQACgkQEMKTtsN8
Tja58g//Vdpq3togTobGNyGNHK5nHdOt85FgSljukg+Tcd84MebaRxXP7KA43KBX
9cXSL9acnuGor1UeXfI9HBolcPQN30nk3KeMurJstgDm1x0bxF3dMaa9xzPgLwak
0wcllPb7g5l0UHV+J5zygqJ5yXEImOEb5F8uh2IRpCA3gg+76xLMP+wv7K6mzo7l
TymNozXfYBG1eS6kkBUgWSoyUTMdmqHiw64yMvZzp1Whyr6+glX2RUl5KEWLrrcO
/ydSS1eU8t/dJEd4uC2JMj5LajdFJxAw83obTo81/KPMcww6riEHseKkXzKAvxmp
Eq1e1ZoX5OdidFb1UfihoWkJlgd+RzFRZN4rpVVBj+M/Q4kAYEOnBY/3/kVoKNgP
jw4/xX4EV+WpwQB6AtGjXwvdvDFJXka8eNqaxOig0NenE6kX9VXIPunsTacsKtma
3Nk9V8VFWhuXc+d00jEF74TNb+6RWlZhc+U+y2C7FdRQsmghXxzrOzDp5tp51xTK
taGlYuelEQCH1sToKzoZwBRO4qO1pK/qRHqWY9efipRwQQ2kk7pB4NU7hVPJccok
wVDY4rvEF+DsgY6P8Ai3+6+O9u0gip+JigTJGy9cGLwBsnkAGYtYEXerrLdNgdTa
zPL+zpzmLfeAOYvtZqKyA/kWbsqbdaxdyLpwHYkXV7Gm3ImkLYA=
=RuOm
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ