Debian Security Advisory DSA 832-1 (gopher)

Summary
The remote host is missing an update to gopher announced via advisory DSA 832-1. Several buffer overflows have been discovered in gopher, a text-oriented client for the Gopher Distributed Hypertext protocol, that can be exploited by a malicious Gopher server. For the old stable distribution (woody) this problem has been fixed in version 3.0.3woody4.
Solution
For the stable distribution (sarge) this problem has been fixed in version 3.0.7sarge2. For the unstable distribution (sid) this problem has been fixed in version 3.0.11. We recommend that you upgrade your gopher package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20832-1