-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2490-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst June 7, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nss Vulnerability : denial of service Problem type : remote Debian-specific: no CVE ID : CVE-2012-0441 Kaspar Brand discovered that Mozilla's Network Security Services (NSS) library did insufficient length checking in the QuickDER decoder, allowing to crash a program using the library. For the stable distribution (squeeze), this problem has been fixed in version 3.12.8-1+squeeze5. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 2:3.13.4-3. We recommend that you upgrade your nss packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJP0Q/EAAoJEOxfUAG2iX57lXcH/RKOQtCi2JHKqGhUEDWyAbEl 05x34/8JBRrOb/SSymDQQWKChp+S5XVh4rZdHO8RaC9d/w62LzO8vCvD3mTL1NDr c/NdqAY+EEoWIeoq7I7CziHN9FDMcqZY5MgJ6ZLfpzQqfQW07OaeFxyG6HABmC03 sXDW9/acd6+noJeXnpjMyG9IrIn2WpgoLCUL80j2hP7nDGV2/W3RDec74xol09sX W1lOfyx3YdIY39V7nAUtpJ+uTOGiwus7sUz+YzYYMnGM7WmY498Z5D0Qhpr9r+Ss HkRy4ivT3TtqmRdUGHfFPMH9JsjNBPuN4YHE5dMU5hDuNpaOMvv/4aDknVzzHlM= =D6qe -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/