SUSE alert SUSE-SU-2015:0884-2 (spice)
From: | opensuse-security@opensuse.org | |
To: | opensuse-security-announce@opensuse.org | |
Subject: | [security-announce] SUSE-SU-2015:0884-2: important: Security update for spice | |
Date: | Sat, 16 May 2015 01:04:53 +0200 (CEST) | |
Message-ID: | <20150515230453.D4DDC32159@maintenance.suse.de> |
SUSE Security Update: Security update for spice ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0884-2 Rating: important References: #848279 Cross-References: CVE-2013-4282 Affected Products: SUSE Linux Enterprise Software Development Kit 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The remote desktop software SPICE was updated to address one security issue. The following vulnerabilitiy was fixed: * A stack-based buffer overflow in the password handling code allowed remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. (bsc#848279, CVE-2013-4282) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-199=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (x86_64): libspice-server-devel-0.12.4-6.1 spice-debugsource-0.12.4-6.1 References: https://www.suse.com/security/cve/CVE-2013-4282.html https://bugzilla.suse.com/848279 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org