news 28 Posted May 9, 2017 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : radicale Version : 0.7-1.1+deb7u2 CVE ID : CVE-2017-8342 Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method. For Debian 7 "Wheezy", these problems have been fixed in version 0.7-1.1+deb7u2. We recommend that you upgrade your radicale packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJZEh+WXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hH+zgQAJ+Btp3/G7usReDEOvOaLS5T pfuOFNENHN84H8XEMnVNUB5n9dWK8T89w4Gze4OPO9uCjaIyJzc4eloZkgYXK8iC cnMenfauymzIEmmzFoTemBAZNhJJYaU3j7hFFlyeShrwrwBAlDAlMlEYufw5w72b k0jLiwRkQmh4HhHYuccJ4Kk3cAr1Gcb+RSHl1OGLwkNWSgz8Drpb1wW94FcJUMhE YrpqhO7M/MK3H0r44N3YHiVt/2e1OJX1ygDnlkcorbu5gdlSc3sgjnaQ2zr5JuZR us5xVuuk6CN5Xg3vp0rIKV/Htt79mB2W2Pu9i+qL8z3QhxrdDznlkX5hUObXgEKQ /a/7QEH9eCdpIky7OLlyPt9j/G3PHDw5J3wT40KRjtUezyaPBd0w6qbLFbbVq/B5 WybDu+9s7UWx9KlpeH+1lhE6G3Bkn4gXZ/6aeK72jlqwifI61Kyzn7iMLICKCmqR n7wisxhff/MTCklKWeeyisYruM/6mIX3yjhKWamb5h/TrhRdZDrn+axgyvecJaft nqzPTn6SjwxUKDvJb5vRAB87S6KVwS9DqcGN03zbAg3CtcaLG2cG0OiNnNhRUJSp VmFaQo3g94pCXKkz30by6c5kz/lfrgJLCwqiJS7w14lNIpeueycCinflMb34gRMA CtDp6sdza3teCtbaViNZ =uB37 -----END PGP SIGNATURE----- Share this post Link to post