it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4707-1] mutt security update
- Date: Fri, 19 Jun 2020 20:43:34 +0000
- List-archive: https://lists.debian.org/msgid-search/20200619204334.GA13338 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=bouttrYVmB6VFyttMrRcyNt7qp2ADk6LejOVSmzHhWM=; b=ac WBaCsVMVeNuZezgafhzgD0n/pOS85ROyzS7eLC3SDtvi9KxV/CAJMme1Y7qnKLrDS4wvf+J9NcSD4 At7Xh/oxiG3oblthTEtWcwhxdPODdb/VlSkgfbPSxpMk8EmowI3jyUIVGsgmyQ8GRWnYJE/Mr6K3c O0Q+IQMWhhZbyziYDOjQhH4rx9+84LCQkofCP1qDWU9FuNMw4IT+O6V/c5ecjUx+bvF7RbHBQxchA jvIXsyvmYJQ3ZggpaVjguGzpiXTRHr8oxcMH0H7DGZvRW+mkebpdznx8cUxz/AF+TwRRjXQPUaWHz Ug17MjfyvlnqhV80wWi/4JOzd6hocwwg==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 19 Jun 2020 20:43:53 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <84rSwwceVgB.A.-n.IOS7eB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4707-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 19, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mutt
CVE ID : CVE-2020-14093
Damian Poddebniak and Fabian Ising discovered two security issues in the
STARTTLS handling of the Mutt mail client, which could enable MITM
attacks.
For the oldstable distribution (stretch), these problems have been fixed
in version 1.7.2-1+deb9u3.
For the stable distribution (buster), these problems have been fixed in
version 1.10.1-2.1+deb10u2.
We recommend that you upgrade your mutt packages.
For the detailed security status of mutt please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mutt
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=1ns2
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4707-1] mutt security update, Moritz Muehlenhoff, 19.06.2020
Archiv bereitgestellt durch MHonArc 2.6.19.