-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3368-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 25, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : cyrus-sasl2 CVE ID : CVE-2013-4122 Debian Bug : 784112 It was discovered that cyrus-sasl2, a library implementing the Simple Authentication and Security Layer, does not properly handle certain invalid password salts. A remote attacker can take advantage of this flaw to cause a denial of service. For the stable distribution (jessie), this problem has been fixed in version 2.1.26.dfsg1-13+deb8u1. For the unstable distribution (sid), this problem has been fixed in version 2.1.26.dfsg1-14. We recommend that you upgrade your cyrus-sasl2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWBXdQAAoJEAVMuPMTQ89E4YwP/0I7N3mL0ujoI4EOdX+LlyEJ WfdJomdFjIiDIn5Xa7Dp63UdHUM8yrU46YFwpF8QB7U+kjPPkpEdbMA+X0Y/4HGj bzbu4a5Ah94XLmnEoYNribCqARyXZLRhFuttQShjmdNRFXsyvWpjDAy3XlPIxlbS dIMeEvCXnKqqvJdSax/IJblK/h2LM3QZ421wqib/J5yqf663I3+1+XKYZaJUKzfT +P3CN+BcJYPQMcsL8D2G/PFa78IPzgjVhRk5znOMgR927eoghwHeA3xUtvbpJERC wjMtDMSwBGmtzi2hanXUFC1a3/eCvha36lGWJ5VH/Y2O7/v9EdVN/5P+csAggmK8 TSInUTHAcPr7IEs3X5UaqHOHvNZpelFmZ77HnKunkIpLksXezi17+teR1ZaPY9gr 0N4mh0VaalxpBBnXVMdNXIN0U/LyOmLIPufgqFWa79yImRBuki9pOkEi2iPM9D8/ QW0lc1/vAcQfeiwBFC/aav97YkjCpANVVdslBrds8zJgUXc54vjix5MW/MA4B5rI Be+52bxLe3J/wl192OyABOSp5LWWoTR1lLyJLrdNvh8TllOwJqoMoNhONi/B1i88 Sy4x1DLQFMLLqyp6R/9FpdG7Wb8KaTIP/u0T2xtMk7KZRKeUKa6C+9xHyiDOS70N LKXykfdE5jwlsK+FizKe =JMe8 -----END PGP SIGNATURE-----