[USN-2736-1] Spice vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Tue Sep 8 14:28:05 UTC 2015


==========================================================================
Ubuntu Security Notice USN-2736-1
September 08, 2015

spice vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS

Summary:

Spice could be made to crash or run programs.

Software Description:
- spice: SPICE protocol client and server library

Details:

Frediano Ziglio discovered that Spice incorrectly handled monitor configs.
A malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
  libspice-server1                0.12.5-1ubuntu0.1

Ubuntu 14.04 LTS:
  libspice-server1                0.12.4-0nocelt2ubuntu1.1

After a standard system update you need to restart all QEMU virtual
machines using Spice to make the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2736-1
  CVE-2015-3247

Package Information:
  https://launchpad.net/ubuntu/+source/spice/0.12.5-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20150908/9a2b54c3/attachment.sig>


More information about the ubuntu-security-announce mailing list