-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2935-1 security@xxxxxxxxxx http://www.debian.org/security/ Moritz Muehlenhoff May 21, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libgadu CVE ID : CVE-2014-3775 It was discovered that malformed responses from a Gadu-Gadu file relay server could lead to denial of service or the execution of arbitrary code in applications linked to the libgadu library. The oldstable distribution (squeeze) is not affected. For the stable distribution (wheezy), this problem has been fixed in version 1.11.2-1+deb7u2. For the unstable distribution (sid), this problem has been fixed in version 1:1.12.0~rc3-1. We recommend that you upgrade your libgadu packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTfPEvAAoJEBDCk7bDfE42RRkP/iajMl8bq3LHlIKFKKX4mFTx jy9t94uIxq8SrhIKZv1QvAWzsVQJ6EtMBDlAGpqA9MwW0bgjZCor5U+cLRIV64Aj bp+yGHk+Ze24JCyf3M3MSxXvVCZ3o5d5y8B6AAVkzbtGWy2KStIUHYcvV37QRMWr MM63StFTZoMqFUwHMWbJTfS28el++7rdGPHNVR2v0SzbP5R20D2F7tmfg6tGB9Yx UwZF96rCA/UBu+kLWADYN1ffhC++UkBDwP5yiViKKfiKulj+0wCr9t7IvCI4UE5r SkuVfPezKOCm58UBjG/g8nClhfI7ajxEkaSdrFNQ/AIdnfQkW2d/iOuvMQvJDBT5 wIsI5/9RCF9JdrquPZWPHyOdaHk3j44IS7qTxI6BrwZvW1/rLquWh3tWATsvjywT cqdlTu/eriaXXbRAZ/YzK4HMsSYigOK3wj7bxXwyVTjhbzoaapIKlof2/aYemkCT pLowzBtT7TZFTTJ6kn9rqbBofAR6gSONgsrLV0hgGR8BziczCkYSPSIvif3d56hH Vqgmzun2a57PTvjJwrC7s3wrWbuPP4vxZMd8XemrwfC5wZ+FY2/rzwJEN7YfNsHA WxDWCcLBYlawe7iecc3ca6X5gZ/tkI3iegSN5Xmdvncmz1nslKmLPh34jPSlAF6P C6d+4JnTNaMc3QqFrUq/ =/8NZ -----END PGP SIGNATURE-----