—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3704-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 03, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : memcached
CVE ID : CVE-2016-8704 CVE-2016-8705 CVE-2016-8706
Debian Bug : 842811 842812 842814
Aleksandar Nikolic of Cisco Talos discovered several integer overflow
vulnerabilities in memcached, a high-performance memory object caching
system. A remote attacker can take advantage of these flaws to cause a
denial of service (daemon crash), or potentially to execute arbitrary
code.
For the stable distribution (jessie), these problems have been fixed in
version 1.4.21-1.1+deb8u1.
We recommend that you upgrade your memcached packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=gl5N
—–END PGP SIGNATURE—–