Package: libupnp6
Version: 1:1.6.17-1.1
Severity: grave
Tags: security
Justification: user security hole

Dear Maintainer,

http://www.zdnet.com/millions-of-pcs-exposed-through-network-bugs-security-researchers-find-7000010478/

Fixed in  1.6.18.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.7.5 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libupnp6 depends on:
ii  libc6              2.17-0experimental0
ii  multiarch-support  2.17-0experimental0

libupnp6 recommends no packages.

libupnp6 suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to