==========================================================================
Ubuntu Security Notice USN-3751-1
August 22, 2018
spice, spice-protocol vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Spice could be made to crash if it received specially crafted network
traffic.
Software Description:
– spice: SPICE protocol client and server library
– spice-protocol: SPICE protocol headers
Details:
It was discovered that Spice incorrectly handled certain messages.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
libspice-server1 0.14.0-1ubuntu2.2
Ubuntu 16.04 LTS:
libspice-protocol-dev 0.12.10-1ubuntu0.2
Ubuntu 14.04 LTS:
libspice-server1 0.12.4-0nocelt2ubuntu1.7
After a standard system update you need to restart qemu guests to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3751-1
CVE-2018-10873
Package Information:
https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2
https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.2
https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=t4yF
—–END PGP SIGNATURE—–
—