lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 29 Jan 2019 16:34:12 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4375-1] spice security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4375-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 29, 2019                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : spice
CVE ID         : CVE-2019-3813
Debian Bug     : 920762

Christophe Fergeau discovered an out-of-bounds read vulnerability in
spice, a SPICE protocol client and server library, which might result in
denial of service (spice server crash), or possibly, execution of
arbitrary code.

For the stable distribution (stretch), this problem has been fixed in
version 0.12.8-2.1+deb9u3.

We recommend that you upgrade your spice packages.

For the detailed security status of spice please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/spice

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=2aES
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ