| 
    Message-Id:67N3S4V3_54f5c3e5319b6_35a33f84330cd338108062c_sprut##- Bitte geben Sie Ihre Antwort über dieser Zeile ein. -## Deine Anfrage (# 2976) wurde aktualisiert. Um darauf zu antworten, antworte einfach auf diese Mail.
 | | ![Johansson]() |               Johansson Victor                            3. März, 15:23                 You do realise this is a “loop” and you will keep replying to the WHOLE mailing list until you remove your “auto-reply”….?       7 mails and counting…..       Regards       Victor   | 
 | 
 | | ![Frank Menz]() |               Frank Menzel (sipgate Adminteam)                           3. März, 14:45                 Haben wir nicht, sagt dpkg-info   | 
 | 
 | | ![Debian-sec]() |               Debian-security                            2. März, 21:53                 -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512
     - -------------------------------------------------------------------------Debian Security Advisory DSA-3178-1                   security@debian.org
 http://www.debian.org/security/                      Salvatore Bonaccorso
 March 02, 2015                         http://www.debian.org/security/faq
 - -------------------------------------------------------------------------
     Package        : unaceCVE ID         : CVE-2015-2063
 Debian Bug     : 775003
     Jakub Wilk discovered that unace, an utility to extract, test and view.ace archives, contained an integer overflow leading to a buffer
 overflow. If a user or automated system were tricked into processing a
 specially crafted ace archive, an attacker could cause a denial of
 service (application crash) or, possibly, execute arbitrary code.
     For the stable distribution (wheezy), this problem has been fixed inversion 1.2b-10+deb7u1.
     For the upcoming stable distribution (jessie), this problem has beenfixed in version 1.2b-12.
     For the unstable distribution (sid), this problem has been fixed inversion 1.2b-12.
     We recommend that you upgrade your unace packages.       Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can be
 found at: https://www.debian.org/security/
     Mailing list: debian-security-announce@lists.debian.org-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
     iQIcBAEBCgAGBQJU9Mw0AAoJEAVMuPMTQ89EIMkP/1QVDTGcBl37MhPpON76e0ikjLipT0szpX9/14wdZZzumZa673rlNXi9fC9YHlGVxolsT24hETJo9EIyrspksQiW
 eSp9hqXr6l5qsfdEmY8JChR3/UOPM9dQ0giRSefjjvgwpHGDeC1Laqa1Oa0V3AOf
 U9DjmFg50YK64CAKX2aDdhKOtbaVS2FyVqpEzH844hCqTm8QwiSp1pBSo4o/i87w
 FzB57NKIih1qmDpGRaCKKsehg1CGzic6CnNRnie4L89gVT1fvHd7lalHQF/HuTaq
 RSO7DiuF3czU+LVwQt/KxlqyUhCiT5XG9v/W6fl3uBOoy5sWuuuRDBWHHPciR9ns
 Jzw17jw5asL4OcHsq5GL3H4Ax228eU2GtWwzJyFErW5w9SHfnts2HUP7r+7qEWf8
 YJIyaqsczKIWep7BrX37BWd9x+fc1ei1XzgychgaQNgJrrGORjpuBd+ow1qhXHC1
 GmplBwTzHYmZKeYsRczb3E0Mm5n9kP/tsnLD0spNXK8DclhpxsWOw5EC+GRc+QDu
 aOpVDZi3K9/fpRky+vZJlMg+vMnqxG8KKwoSbXWq/uuwgYUaZUQUKiKRTUlrYRl2
 RAVsjA93cx4yq5gcYX715p923I991YflVkvz38RhbrmRzaQPN153NMnx6XLO+fpR
 fT88TocQH3F2YdgqjaLV
 =MznR
 -----END PGP SIGNATURE-----
     --
 To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
 with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
 Archive: https://lists.debian.org/E1YSXFF-0005Ew-SE@master.debian.org
 | 
 | 
     Diese E-Mail ist ein Service von sipgate Adminteam. Bereitgestellt von Zendesk .
     |