Control: tags -1 moreinfo

On 16/02/17 06:06, Salvatore Bonaccorso wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian....@packages.debian.org
> Usertags: unblock
> 
> Hi
> 
> Please unblock package spice
> 
> It fixes two CVEs, CVE-2016-9577 CVE-2016-9578, reported by Moritz as
> #854336. Markus Kschany fixed it as:
> 
> +spice (0.12.8-2.1) unstable; urgency=medium
> +
> +  * Non-maintainer upload.
> +  * Add CVE-2016-9577-and-CVE-2016-9578.patch:
> +    - CVE-2016-9577: A buffer overflow vulnerability in
> +      main_channel_alloc_msg_rcv_buf was found that occurs when reading large
> +      messages due to missing buffer size check.
> +    - CVE-2016-9578: A vulnerability was discovered in the server's
> +      protocol handling. An attacker able to connect to the spice server 
> could
> +      send crafted messages which would cause the process to crash.
> +      (Closes: #854336)
> +
> + -- Markus Koschany <a...@debian.org>  Mon, 13 Feb 2017 21:42:01 +0100
> 
> Attached the resulting debdiff from the version in testing.
> 
> unblock spice/0.12.8-2.1

That failed to build on mips(64)el:

https://buildd.debian.org/status/package.php?p=spice

Cheers,
Emilio

Reply via email to