Denial of Service in libcacard
ID: | FEDORA-2017-5a6ed9d326 |
Distribution: | Fedora |
Plattformen: | Fedora 25 |
Datum: | Sa, 4. März 2017, 09:42 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6414 |
Applikationen: | libcacard |
Originalnachricht |
|
Name : libcacard Product : Fedora 25 Version : 2.5.3 Release : 1.fc25 URL : http://www.spice-space.org/page/Libcacard Summary : CAC (Common Access Card) library Description : This library provides emulation of smart cards to a virtual card reader running in a guest virtual machine. It implements DoD CAC standard with separate pki containers (compatible coolkey), using certificates read from NSS. -------------------------------------------------------------------------------- Update Information: new upstream release 2.5.3, fixing leaks -------------------------------------------------------------------------------- References: [ 1 ] Bug #1427833 - CVE-2017-6414 Qemu: libcacard: host memory leakage while creating new APDU https://bugzilla.redhat.com/show_bug.cgi?id=1427833 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade libcacard' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |