Debian: DSA-3309-1: tidy security update
Summary
Geoff McLane also discovered that a similar issue could trigger an
integer overflow, leading to a memory allocation of 4GB. This could
allow remote attackers to cause a denial of service by saturating the
target's memory.
For the oldstable distribution (wheezy), these problems have been fixed
in version 20091223cvs-1.2+deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 20091223cvs-1.4+deb8u1.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your tidy packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org