[DLA 39-1] gpgme1.0 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Package : gpgme1.0
Version : 1.2.0-1.2+deb6u1
CVE ID : CVE-2014-3564
Debian Bug : 756651
Tomas Trnka discovered a heap-based buffer overflow within the gpgsm
status handler of GPGME, a library designed to make access to GnuPG
easier for applications. An attacker could use this issue to cause an
application using GPGME to crash (denial of service) or possibly to
execute arbitrary code.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFT9Opu02K2KlS5mJARAtdnAJ4qI1WnUC5I1uZMnWO9xD400c9ovQCfTRfi
19YJgpUqmbOgowdaVbpNF08=
=4aLw
-----END PGP SIGNATURE-----
Reply to: