lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20180401125237.GA31018@pisco.westfalen.local> Date: Sun, 1 Apr 2018 14:52:37 +0200 From: Moritz Muehlenhoff <jmm@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4160-1] libevt security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4160-1 security@...ian.org https://www.debian.org/security/ Moritz Muehlenhoff April 01, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libevt CVE ID : CVE-2018-8754 It was discovered that insufficient input sanitising in libevt, a library to access the Windows Event Log (EVT) format, could result in denial of service or the execution of arbitrary code if a malformed EVT file is processed. For the stable distribution (stretch), this problem has been fixed in version 20170120-1+deb9u1. We recommend that you upgrade your libevt packages. For the detailed security status of libevt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libevt Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlrA1d4ACgkQEMKTtsN8 TjbpMg/+Kd6gI+FUez9dCz9KZd5rzuMwcv8valLGN2h7Tnd4CV1Yd5qrH9EtSCNy kK3xN9tWJ9Fdrvh+8GDBV/6MHFiirwAK58lwGUBp475/tzWRh0hlKwuJ2gqikMO2 lups7qqpoEzJtpi6H5otQdeuWgvbpZ1MlItMy3UqQaVxfK2ehjZO3Nq0uv+DkZ4W dSbfu3XS9H3Qz5Y1wQJfwjkqKbfKtXxSJNVxvWlE8v34i5rSpn1iboKfyBjeNQ6m pLC/l15N5t7V2MNbkNht0XeRci9KCn2TXD7vYPjAbckCCy7bS/CladXFnDCwohoT qyHbrvgSwT1Bm7xA5LK3YfvfLDOyERaAxNjDTiBrh00b5WzOklPfOmbfEgqNBSl4 trwV6mOkuyb2JrakOFKdxQqocb0YKqfxb11K5LTcGq/jJKpq3V/XO4OSgH8chNcW 2MOPY4JtbUAT90Zx5HdX0k/xYbi8J/qflra0wI6cqum86mn2uPhWUYzXBfMH2U/y k9MduKTrVkJQjggarMutJfUMpSaisyBNhxuZkDLajYuJ11wUCGJcqNrYCpFjKBAf FF5FQ9pqmJAoZegTSO9+7kNp1O1fCZIV2jMpwm1ea7RB5hLLmtK/vUjot0qAjbFv kTlDvwX6SsatVn+BNCIIaN1FB20NTakFLZJvsY9+eCYGDp6o+ds= =ZoaG -----END PGP SIGNATURE-----
Powered by blists - more mailing lists