help On Sat, Mar 10, 2012 at 10:51 AM, Moritz Muehlenhoff <[email protected]> wrote:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-2430-1 [email protected] > http://www.debian.org/security/ Moritz Muehlenhoff > March 10, 2012 http://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : python-pam > Vulnerability : double free > Problem type : remote > Debian-specific: no > CVE ID : CVE-2012-1502 > > Markus Vervier discovered a double free in the Python interface to the > PAM library, which could lead to denial of service. > > For the stable distribution (squeeze), this problem has been fixed in > version 0.4.2-12.2+squeeze1. > > For the unstable distribution (sid), this problem has been fixed in > version 0.4.2-13. > > We recommend that you upgrade your python-pam packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: http://www.debian.org/security/ > > Mailing list: [email protected] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.11 (GNU/Linux) > > iEYEARECAAYFAk9bNXYACgkQXm3vHE4uylo+TQCfW0THq+ZN0zAE7V6btlUPXklf > DgwAoMOwfoeJ8BJNxMCk1BCZ0GetI82w > =uyet > -----END PGP SIGNATURE----- > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
