CONFIDENTIAL Melvin -
I appreciate your response, however this issue is very serious. Please answer all of the questions accurately, as I have requested in a clear, unambiguous, and ethical manner. Thank you! Kyle -------- Original Message -------- Subject: Re: "Ian Murdock" Death From: Melvin Adolfo Reyes Martin <melv...@wisecode.org> Date: Sat, July 16, 2016 2:01 am To: Kyle Lussier <k...@countervaillance.com> Cc: debian-security@lists.debian.org, Salvatore Bonaccorso <car...@debian.org> is dead, get over it On Fri, Jul 15, 2016 at 7:18 PM, Kyle Lussier <k...@countervaillance.com> wrote: CONFIDENTIAL Hello Debian / Savatore - I am investigating the death of Ian Murdock and also a debian user. * Debian's core MIT distribution may have been compromised by "Ian" internally to get into one of our servers. * Can you confirm that "Ian Murdock" was the "ian" in debian? * Can you confirm that he is actually dead/committed suicide? * If not, did he fake his death? Perhaps after compromising servers intentionally and committing many felonies? The coroner and related PD have not responded however several federal agencies are aware of the issue. This is a very serious matter. Thank you for your assistance! Kyle -------- Original Message -------- Subject: [SECURITY] [DSA 3620-1] pidgin security update From: Salvatore Bonaccorso <car...@debian.org> Date: Fri, July 15, 2016 12:03 pm To: debian-security-annou...@lists.debian.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3620-1 secur...@debian.org https://www.debian.org/security/ Salvatore Bonaccorso July 15, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : pidgin CVE ID : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368 CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372 CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376 CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323 Yves Younan of Cisco Talos discovered several vulnerabilities in the MXit protocol support in pidgin, a multi-protocol instant messaging client. A remote attacker can take advantage of these flaws to cause a denial of service (application crash), overwrite files, information disclosure, or potentially to execute arbitrary code. For the stable distribution (jessie), these problems have been fixed in version 2.11.0-0+deb8u1. For the testing distribution (stretch), these problems have been fixed in version 2.11.0-1. For the unstable distribution (sid), these problems have been fixed in version 2.11.0-1. We recommend that you upgrade your pidgin packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-annou...@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXiTCbAAoJEAVMuPMTQ89E4nUP/jEpNVpOe4FcStlU24Cv1qOS BsNBvRlp1XhhshzoBAWZSBTKFi4jqilOZUgjsHO76nHS7j0J4wzoWc36ZIp23O5p KX9+A87ZdS4C3hI1YGgTdCcMTKSnWIrS1YcOW/0qBx7jdXt5EhFPKJa/byhHsp23 zguJ+glemJQ9uqpylc5om2udV4u9U5Nnc+Ga92zeR7Kefs20yRTLOef4Pd69LPwh +zM0/qkI+JMii0yMpMJsIpMsXzQvzvgd4E6r3+NrWOHOCoZ8XZD4UvsR3Bnw8nvg ed+hg2nj3uMWgXtv4Bdx+yUxsWdRFSjpiD1EXWmvzREgmDdrlnCGZB3yQbepA0Yi lHsHEAwq3GZalLAeW8lwIQVaSLSREO6ZxcY7OxG2vdYzbkoQKCK7K4rR4T3yxB83 tAvYWRxCTMaeRxqUgLEAq0iMqQhvrmNDDEt5VVsE1bSn9gig6MkSGepFdzx4Yipq +a8XUgJt8tLbpuTD9Pg9Ig8Mee0SaHSxr8bP6fFlfJu0Wt59MKn3wNzcqPhb+3Ie FtLyo6XBC4hnsoVlRT569fwkuYaI/kptT95tKiqyYI+RFnSW0WP4dycmo2pHOuIP mckCbAM7s+vuCGe1YQHJiOCeTrIDKAkKPbudjBL/g2zbcY+KayMXTvZbbW+ma8c0 wMiDOiIYUd4xMSvjBeF0 =QNWs -----END PGP SIGNATURE-----