-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2931-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff May 18, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openssl CVE ID : CVE-2014-0198 It was discovered that incorrect memory handling in OpenSSL's do_ssl3_write() function could result in denial of service. The oldstable distribution (squeeze) is not affected. For the stable distribution (wheezy), this problem has been fixed in version 1.0.1e-2+deb7u9. For the testing distribution (jessie), this problem has been fixed in version 1.0.1g-4. For the unstable distribution (sid), this problem has been fixed in version 1.0.1g-4. We recommend that you upgrade your openssl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTeK1fAAoJEBDCk7bDfE421TYQAJ8h8MEnc+GusIkargeIQ1ez hQY8X2M/4ksfXM2QgR9345PtVA2aEYhbmk+p6Mt8aAqGhqWmT8VbvGrKl48SNpHj T0XAzgwaA4bTe6IDOXCnwEUApWQetm8u+jgI/D8yZ6gWJSo4buu8ZWvvFVu7ksnU tBEY2D8n91XgXe4D6bsWCSHQ96lUf7viNzmupUazhok+nWtXb2VBsvsJXIzAgP8Y +SdoUd8PhERxmhTF6qayVUgiHpiuVkVF9ePk7N4q6BqwwYIqVoXTzNcu2R2OMR65 z2b2HpkWnWVft4uswWgJoWbU0ak8i4ggbxxZadHI7M8hUFfNBTpbCrt+lU7+g3Hb va1LXML9IH8G4beGit0CWz5vOCHTqsdB/NUxY44PlFE3KeDFo2Pa9CBTFGY6BMMS abuBOn3+Mm5AYm1wXGsy38R5V5pbFs9fIlbJ7VIQXMrE+ptd8MFqgHRGpiQisZrp 0KW0bP29Prz8Nq94/h96pHgI/2VnTARpPlpqSuMqe14gumjHYx8/xGff4wVaLoWw dicBZUlI/c2shmmWQZflC5OYvnoTphkb+tSiPvQArKNh9H080LqRc1HWlTaknS/Y 2pCeW4ZOD3XNgcGjhmlfegFk2tPc7mi35kggguFJHmzI+nLy4jHQ1i4e1RBjoyT/ q2ONI2e12COOGx9bmNz6 =hYGC -----END PGP SIGNATURE-----