ELSA-2013-1273

ELSA-2013-1273 - spice-gtk security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2013-09-19

Description


[0.14-7.3]
- New build with correct patch for CVE-2013-4324

[0.14-7.2]
- Fix race condition in policykit use (CVE-2013-4324)
Resolves: CVE-2013-4324


Related CVEs


CVE-2013-4324

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) spice-gtk-0.14-7.el6_4.3.src.rpmcba939604c088da4e09e451a86d6b1b7ELSA-2020-0471
spice-glib-0.14-7.el6_4.3.i686.rpm7dc9b80aeab07b436819304a7783422dELSA-2020-0471
spice-glib-devel-0.14-7.el6_4.3.i686.rpmd5c722cb22273bba0479810b6d4e5b6aELSA-2020-0471
spice-gtk-0.14-7.el6_4.3.i686.rpm58204353ccede42732223cf616735a3cELSA-2020-0471
spice-gtk-devel-0.14-7.el6_4.3.i686.rpm309b5fe09a8a5c50bc3f46483bcf1b2eELSA-2020-0471
spice-gtk-python-0.14-7.el6_4.3.i686.rpmdf57a01d7b1056d06d976add57730c8aELSA-2020-0471
spice-gtk-tools-0.14-7.el6_4.3.i686.rpmf085228a15fcded976273221bf7af9f7ELSA-2020-0471
Oracle Linux 6 (x86_64) spice-gtk-0.14-7.el6_4.3.src.rpmcba939604c088da4e09e451a86d6b1b7ELSA-2020-0471
spice-glib-0.14-7.el6_4.3.i686.rpm7dc9b80aeab07b436819304a7783422dELSA-2020-0471
spice-glib-0.14-7.el6_4.3.x86_64.rpmc544e8995c9fd25372670d74ece4c0c3ELSA-2020-0471
spice-glib-devel-0.14-7.el6_4.3.i686.rpmd5c722cb22273bba0479810b6d4e5b6aELSA-2020-0471
spice-glib-devel-0.14-7.el6_4.3.x86_64.rpm59000a8aa140b74e6d4e640a4433a9feELSA-2020-0471
spice-gtk-0.14-7.el6_4.3.i686.rpm58204353ccede42732223cf616735a3cELSA-2020-0471
spice-gtk-0.14-7.el6_4.3.x86_64.rpme2caf91644f9726a2a2cd4f4caf31b63ELSA-2020-0471
spice-gtk-devel-0.14-7.el6_4.3.i686.rpm309b5fe09a8a5c50bc3f46483bcf1b2eELSA-2020-0471
spice-gtk-devel-0.14-7.el6_4.3.x86_64.rpmae9c78b24768a972dc06c72cb978e129ELSA-2020-0471
spice-gtk-python-0.14-7.el6_4.3.x86_64.rpmb91fa87155549204cb09b3d63c108f7aELSA-2020-0471
spice-gtk-tools-0.14-7.el6_4.3.x86_64.rpm28cd93232d4eef82ee9117592991704eELSA-2020-0471



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete