Package: sylpheed-claws Severity: grave Tags: security Justification: user security hole
Buffer overflows have been found in Sylpheed-Claws's LDID/pine/mutt address book import features. Quoting from the 1.9.100 release announcement: * Buffer overflows in the address book 'Import LDIF/Mutt/Pine file' functions were fixed. This was a security hole. It only affected these address book import functions, but we recommend that everyone upgrade. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-1-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]