1 | | {{{ |
2 | | From: Nelson Elhage <nelhage@mit.edu> |
3 | | To: barnowl-users@mit.edu |
4 | | Subject: BarnOwl 1.5.1 released |
5 | | |
6 | | Hello, |
7 | | |
8 | | We have just released BarnOwl 1.5.1 to our website and into our locker |
9 | | for all supported Athena platforms. We encourage all users to upgrade. |
10 | | |
11 | | BarnOwl 1.5.1 fixes a remotely triggerable buffer overflow in "CC:" |
12 | | handling (CVE-2010-0793), which has potential for remote code |
13 | | execution. In addition, BarnOwl 1.5.1 fixes numerous memory leaks |
14 | | throughout the program. |
15 | | |
16 | | Thank you for using BarnOwl. As usual, any bug reports, questions, or |
17 | | feature requests can be directed to the developers at |
18 | | <barnowl@mit.edu>. |
19 | | |
20 | | - Nelson Elhage |
21 | | for the BarnOwl team |
22 | | |
23 | | [1] http://barnowl.mit.edu/ |
24 | | |
25 | | }}} |
26 | | |
27 | | Addendum: CVE-2010-0793 affects all releases of barnowl prior to 1.5.1. Remote code execution is theoretically possible, but would be very difficult. |
| 1 | [[redirect(wiki:release-notes/1.5.1)]] |