-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3084-1 security@debian.org http://www.debian.org/security/ Florian Weimer December 01, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openvpn CVE ID : CVE-2014-8104 Dragana Damjanovic discovered that an authenticated client could crash an OpenVPN server by sending a control packet containing less than four bytes as payload. For the stable distribution (wheezy), this problem has been fixed in version 2.2.1-8+deb7u3. For the unstable distribution (sid), this problem has been fixed in version 2.3.4-5. We recommend that you upgrade your openvpn packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJUfNTkAAoJEL97/wQC1SS+6PEIAJ91NoMoz7V9FAV54XVBPOCf G+K9x8AGoNFBIIGNeuclNxAWNS2GTwXmlJcAO7HEJ0iIFGAnAgnItKInbjGDMwTM PHDVxQ6+Di+cEzc3EErhTJTX8o7fJbLLlfsnMr0hm1ETnrBLklggKmZqMksm80pr OIrKvWGAxPI50ZpQpbTZauYrWrnCuMW/OlH84Bqm9BWQ0oQqVE0SpSEWeoYMdv8f v46BOkFqli5uYdr3s4OrKRP2qeoql1M6y+mBKWbtz0ilBaIB3tzbSVDnzFfipAls QDinaLBvQiDQfqSwg2jNtXPKImn9FJXh0QwlMdLi3bUBzmStWCS/wr3RovT3eZA= =16f6 -----END PGP SIGNATURE-----