-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2576-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez November 23, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : trousers Vulnerability : denial of service Problem type : local Debian-specific: no CVE ID : CVE-2012-0698 Debian Bug : 692649 Andy Lutomirski discovered that tcsd (the TPM userspace daemon) was missing a of input validation. Using carefully crafted input, it can lead to a denial of service by making the daemon crash with a segmentation fault. For the stable distribution (squeeze), this problem has been fixed in version 0.3.5-2+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 0.3.9-1. For the unstable distribution (sid), this problem has been fixed in version 0.3.9-1. We recommend that you upgrade your trousers packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) iQEcBAEBCgAGBQJQrxduAAoJEG3bU/KmdcCl5NsH/0lRow6hryWbDPJ1/pnKgh2D DYdlyHoOyd16L1070p4I0lwTjUiOHDOkKpzURLypCjRXCwTi3SnZEof9PzOa+u2A BOLonQKwaDth2Z10YrcNv/u8+XjKHqBuT1H9HPYg24aSPRwY2jCkrDas6HrOsj4X /WNV5UeJe/VvtDpIl24Ce9CC8QRMWBTtaUi02upelgjd0HAChoZxvXmL0qdN8h7f CgXSpk8pcstU51lcH9/5C6zD6X0ej2O1yd8ddz4f4mllr0jm/aN0qGARS6y41Fiz +/Rv5DkR1am1482qP/FLbB/43I4LwrPXrfZIMDkYPnK0jqav2+D9s/MeX0Kj3Ag= =0xCk -----END PGP SIGNATURE-----