drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in c-icap
Name: |
Zwei Probleme in c-icap |
|
ID: |
DSA-3101-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
So, 14. Dezember 2014, 00:32 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7402 |
|
Applikationen: |
c-icap |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3101-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 13, 2014 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : c-icap CVE ID : CVE-2013-7401 CVE-2013-7402
Several vulnerabilities were found in c-icap, an ICAP server implementation, which could allow a remote attacker to cause c-icap to crash, or have other, unspecified impacts.
For the stable distribution (wheezy), these problems have been fixed in version 1:0.1.6-1.1+deb7u1.
For the upcoming stable distribution (jessie), these problems have been fixed in version 1:0.3.1-1.
For the unstable distribution (sid), these problems have been fixed in version 1:0.3.1-1.
We recommend that you upgrade your c-icap packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJUjDnHAAoJEAVMuPMTQ89EmykP/0L2znWupvdsKVpzvmZjRg8w Ousp2MmCpKe7Y9+tHjCgOOogUf7Zs2Vt8w2+tkzX5aYhtyYr8I+uqCYb6IxIcrZO cRjOxd15qtDGYw4P+CZo+ZGbq29Zn1+6oHHh3MSLzkmd1upQubGq6eAtDDKNYhdM SZVsumRPZNZkYiDvVYZ41PRHlsA32WbRRLkJbxKpBFh3pIvlJ4TpDuWdQgyg8oTd 1NdqAT8Mi5Vt982vMDQF4FwiVf+ggEIqcpc5EPvrLkupQfHjaaPovaQ0dI4VXvd6 KBUuXuqwV7j0Lr9pmhwA8KC/cfvlILOmtPfSLSGWW7IIBrlI1rVrH3TOOM5TMJsV F5+q+Z36bMy8pQG8wiQoO7MDBL6DK9yGeAu59bBqDBnXDv3Qp2TUJ56o6pNcUy/M 7txgAOSHkGoRkU4wlGcjAlto1YS5Lq+JUPLl9IXkgMvwFm2pnsE8XaW6Xcv3B2Xu K+GO3PTZ7SQmEnMWtBjoUs0dcL10tIDB2yFGMu/M5T3zaOpcCY0x9KY2/m2Vn+3j OVzI1Cabr5WnJqlphEKQyApZUr6frMjuArzxRHV9iyclxAVgKxAGbItketpS7Jv8 /1Vs65rrBqNpOToU01Z9iAUQj8IkXfyjvYeILFSlipEOF7qPNij6aONLBlNxArb+ Amw4OmHMm198f/E6wgqI =UTzV -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1XzmPk-00011o-5A@master.debian.org
|
|
|
|