An issue has been found in bacula, a network backup service. By sending oversized digest strings a malicious client can cause a heap overflow in the director's memory which results in a denial of service.
For Debian 9 stretch, this problem has been fixed in version 7.4.4+dfsg-6+deb9u2.
We recommend that you upgrade your bacula packages.
For the detailed security status of bacula please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bacula
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS