Package: gnutls28 Severity: grave Tags: security upstream patch fixed-upstream
Hi, the following vulnerability was published for gnutls28. CVE-2013-4466[0]: gnutls/libdane buffer overflow This only affects 3.1.x and 3.2.x so, gnutls28. A patch [1] is provided (upstream recomendation is to directly update to 3.2.5, see [2]). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4466 http://security-tracker.debian.org/tracker/CVE-2013-4466 [1] https://gitorious.org/gnutls/gnutls/commit/ed51e5e53cfbab3103d6b7b85b7ba4515e4f30c3 [2] http://www.gnutls.org/security.html#GNUTLS-SA-2013-3 Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org