[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 934-1] radicale security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : radicale
Version        : 0.7-1.1+deb7u2
CVE ID         : CVE-2017-8342

Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to
timing oracles and simple brute-force attacks when using
the htpasswd authentication method.

For Debian 7 "Wheezy", these problems have been fixed in version
0.7-1.1+deb7u2.

We recommend that you upgrade your radicale packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=uB37
-----END PGP SIGNATURE-----


Reply to: