[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1127-1] sam2p security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : sam2p
Version        : 0.49.1-1+deb7u1
CVE ID         : CVE-2017-14628 CVE-2017-14629 CVE-2017-14630
                 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637


Several vulnerabilites, like heap-based buffer overflows, integer signedness or overflow errors have been found by fpbibi and have
been fixed by upstream.


For Debian 7 "Wheezy", these problems have been fixed in version
0.49.1-1+deb7u1.

We recommend that you upgrade your sam2p packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=ufpR
-----END PGP SIGNATURE-----


Reply to: