[USN-3870-1] Spice vulnerability

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[USN-3870-1] Spice vulnerability

Marc Deslauriers-3
==========================================================================
Ubuntu Security Notice USN-3870-1
January 28, 2019

spice vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Spice could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
- spice: SPICE protocol client and server library

Details:

Christophe Fergeau discovered that Spice incorrectly handled memory. A
remote attacker could use this to cause Spice to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
  libspice-server1                0.14.0-1ubuntu4.2

Ubuntu 18.04 LTS:
  libspice-server1                0.14.0-1ubuntu2.4

Ubuntu 16.04 LTS:
  libspice-server1                0.12.6-4ubuntu0.4

Ubuntu 14.04 LTS:
  libspice-server1                0.12.4-0nocelt2ubuntu1.8

After a standard system update you need to restart qemu guests to make all
the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3870-1
  CVE-2019-3813

Package Information:
  https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu4.2
  https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.4
  https://launchpad.net/ubuntu/+source/spice/0.12.6-4ubuntu0.4
  https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.8


--
ubuntu-security-announce mailing list
[hidden email]
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

signature.asc (849 bytes) Download Attachment