Package: libgadu3
Version: 1:1.8.0+r592-2
Severity: important
Tags: security, patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libgadu3.

CVE-2008-4776:
libgadu before 1.8.2 allows remote servers to cause a denial of
service (crash) via a contact description with a large length, which
triggers a buffer over-read.

The Red Hat bug report[1] has more information and the upstream patch[2].

Since it seems that the issue can only be used to perform a DoS and libgadu
is used by messenger clients, it shouldn't need a DSA/DTSA.

However, it would be nice to get the issue fixed in lenny via migration
through unstable.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Cheers
Steffen

For further information see:

[0] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4776
    http://security-tracker.debian.net/tracker/CVE-2008-4776
[1] https://bugzilla.redhat.com/show_bug.cgi?id=468830
[2] https://bugzilla.redhat.com/attachment.cgi?id=321690



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to