Login
Newsletter
Werbung

Sicherheit: Denial of Service in SPICE
Aktuelle Meldungen Distributionen
Name: Denial of Service in SPICE
ID: USN-1926-1
Distribution: Ubuntu
Plattformen: Ubuntu 13.04
Datum: Mi, 14. August 2013, 18:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4130
Applikationen: SPICE

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0308432132932275558==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigEB40607DA27BA09D5D659083"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigEB40607DA27BA09D5D659083
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1926-1
August 14, 2013

spice vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04

Summary:

SPICE could be made to crash if it received specially crafted network
traffic.

Software Description:
- spice: SPICE protocol client and server library

Details:

David Gibson discovered that SPICE incorrectly handled certain network
errors. An attacker could use this issue to cause the SPICE server to
crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
libspice-server1 0.12.2-0nocelt2expubuntu1.1

After a standard system update you need to restart applications using the
SPICE protocol, such as QEMU, to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1926-1
CVE-2013-4130

Package Information:
https://launchpad.net/ubuntu/+source/spice/0.12.2-0nocelt2expubuntu1.1



--------------enigEB40607DA27BA09D5D659083
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=J2fU
-----END PGP SIGNATURE-----

--------------enigEB40607DA27BA09D5D659083--


--===============0308432132932275558==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0308432132932275558==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung