—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3658-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 01, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : libidn
CVE ID : CVE-2015-8948 CVE-2016-6261 CVE-2016-6263
Hanno Boeck discovered multiple vulnerabilities in libidn, the GNU
library for Internationalized Domain Names (IDNs), allowing a remote
attacker to cause a denial of service against an application using the
libidn library (application crash).
For the stable distribution (jessie), these problems have been fixed in
version 1.29-1+deb8u2.
For the testing distribution (stretch), these problems have been fixed
in version 1.33-1.
For the unstable distribution (sid), these problems have been fixed in
version 1.33-1.
We recommend that you upgrade your libidn packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=pK6c
—–END PGP SIGNATURE—–