[ubuntu/yakkety-proposed] spice 0.12.6-4ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Fri Jun 10 15:10:14 UTC 2016


spice (0.12.6-4ubuntu1) yakkety; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150

Date: Fri, 10 Jun 2016 10:12:39 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/spice/0.12.6-4ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 10 Jun 2016 10:12:39 -0400
Source: spice
Binary: libspice-server1 libspice-server1-dbg libspice-server-dev
Architecture: source
Version: 0.12.6-4ubuntu1
Distribution: yakkety
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libspice-server-dev - Header files and development documentation for spice-server
 libspice-server1 - Implements the server side of the SPICE protocol
 libspice-server1-dbg - Debugging symbols for libspice-server1
Changes:
 spice (0.12.6-4ubuntu1) yakkety; urgency=medium
 .
   * SECURITY UPDATE: denial of service and possible code execution via
     memory allocation flaw in smartcard interaction
     - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
       msg with the expected size in server/smartcard.c.
     - CVE-2016-0749
   * SECURITY UPDATE: host memory access from guest with invalid primary
     surface parameters
     - debian/patches/CVE-2016-2150/*.patch: create a function to validate
       surface parameters in server/red_parse_qxl.*, improve primary surface
       parameter checks in server/red_worker.c.
     - CVE-2016-2150
Checksums-Sha1:
 c8a39f8411ccf07eefd14b4a47457cf224219e99 2394 spice_0.12.6-4ubuntu1.dsc
 b9f2ed642b61889434740081d87263f909ffad3e 12868 spice_0.12.6-4ubuntu1.debian.tar.xz
Checksums-Sha256:
 f6c0352f2126cc13f271bd1b2c1422ed52167c87e5b5ccfe8364a75cf10b4ff2 2394 spice_0.12.6-4ubuntu1.dsc
 5228a4041eee83ff5053f46ccb5c82866e06fc862cfad8578b012a9addba6473 12868 spice_0.12.6-4ubuntu1.debian.tar.xz
Files:
 2fbad0b9254a633713c8f27a506b1112 2394 misc optional spice_0.12.6-4ubuntu1.dsc
 c0121e88c2f4e9f939957088e3e685bc 12868 misc optional spice_0.12.6-4ubuntu1.debian.tar.xz
Original-Maintainer: Liang Guo <guoliang at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=YF1Z
-----END PGP SIGNATURE-----


More information about the Yakkety-changes mailing list