[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 747-1] libupnp security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : libupnp
Version        : 1:1.6.17-1.2+deb7u2
CVE ID         : CVE-2016-8863
Debian Bug     : 842093

Scott Tenaglia discovered a heap-based buffer overflow in libupnp, a
portable SDK for UPnP Devices. That can lead to denial of service or
remote code execution.

For Debian 7 "Wheezy", these problems have been fixed in version
1:1.6.17-1.2+deb7u2.

We recommend that you upgrade your libupnp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlhUWLxfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7
UeSwUxAAnSWDL7z+HlR5LrYCXeC2qCY4P+L1ml6jY/zsNDWkqK+q7vKT32r51v/2
6vSDDUmoALY4qLNRObJv6Z6XCIvlWHfcb5mhPjKuKrcOjEX9nYvjwguaS+Mxx31t
3YGDhR0UJcafb8HkG3bUoX/YoOM7wU+SE+Ef83Gc8shStY0UJLNxqRKVvAnhHug8
s+FxmVavdi0A8mXrk/BR/p/rTRYlxli5IziwF9OhjCplmXMNYyEGmdHDcZS8Pc9v
cwxAS8WN1DtA/owGAAyX5wS0qyoF9PXGV859ICoaXgwHIMpHVKSyvUHOzNWpytxW
g1JX8TdIxnQN8YXzbwb7prchzWmPuy9qTa6iwrosLLxRR0AvToWxhSUVLcLDSHhf
H0EUxbo8vGZcaFBsTkbl1wqO6DuaPEpB5NlOhjU9unylPqaTX2BHfbASR2QNcxZJ
kyt6Jsch9RymBWE4DIyUBMxddlUu7XoSXTrCg4gqetdp+arVLUKazb2a6I7+Geqg
i3pbLhteFha0ogYhh3eaMhY/zlrg2xQQ/plsVxv/neDmIknc61Yi56FIuR1Sk7+U
fDJRO+RXMCo5d6MFLuogdtBqXX++logPdx66W2R2lRWw7T7+24TqXyTuin5mFUIr
hZyI7SxGjG7g9sUnI28Sw/MyunQbZrWxWlGN0oPon4XQ6RLDFno=
=/Hci
-----END PGP SIGNATURE-----


Reply to: