[USN-3751-1] Spice vulnerability
Leonidas S. Barbosa
leo.barbosa at canonical.com
Wed Aug 22 19:23:26 UTC 2018
==========================================================================
Ubuntu Security Notice USN-3751-1
August 22, 2018
spice, spice-protocol vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Spice could be made to crash if it received specially crafted network
traffic.
Software Description:
- spice: SPICE protocol client and server library
- spice-protocol: SPICE protocol headers
Details:
It was discovered that Spice incorrectly handled certain messages.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
libspice-server1 0.14.0-1ubuntu2.2
Ubuntu 16.04 LTS:
libspice-protocol-dev 0.12.10-1ubuntu0.2
Ubuntu 14.04 LTS:
libspice-server1 0.12.4-0nocelt2ubuntu1.7
After a standard system update you need to restart qemu guests to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3751-1
CVE-2018-10873
Package Information:
https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2
https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.2
https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20180822/216fc320/attachment.sig>
More information about the ubuntu-security-announce
mailing list