Ubuntu 4306-1: Dino vulnerabilities

    Date 17 Mar 2020
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in dino-im.
    Ubuntu Security Notice USN-4306-1
    March 17, 2020
    dino-im vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 18.04 LTS
    Several security issues were fixed in dino-im.
    Software Description:
    - dino-im: modern XMPP client
    It was discovered that Dino incorrectly validated inputs. An attacker could use
    this issue to possibly obtain, inject or remove sensitive information.
    This update also includes a fix to the encryption implementation in Dino to
    support 12 byte IVs, in addition to 16 byte IVs.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 18.04 LTS:
      dino-im                         0.0.git20180130-1ubuntu0.1
      dino-im-common                  0.0.git20180130-1ubuntu0.1
    In general, a standard system update will make all the necessary changes.
      CVE-2019-16235, CVE-2019-16236, CVE-2019-16237, https://bugs.launchpad.net/bugs/1866115
    Package Information:

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"96","type":"x","order":"1","pct":80,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.