Login
Newsletter
Werbung

Sicherheit: Denial of Service in Spice
Aktuelle Meldungen Distributionen
Name: Denial of Service in Spice
ID: USN-3751-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
Datum: Fr, 24. August 2018, 18:04
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873
Applikationen: Spice

Originalnachricht


--===============2261334799801105428==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-xPu/5u9JtxS7BijYbEbl"


--=-xPu/5u9JtxS7BijYbEbl
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3751-1
August 22, 2018

spice, spice-protocol vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Spice could be made to crash if it received specially crafted network
traffic.

Software Description:
- spice: SPICE protocol client and server library
- spice-protocol: SPICE protocol headers

Details:

It was discovered that Spice incorrectly handled certain messages.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libspice-server1 0.14.0-1ubuntu2.2

Ubuntu 16.04 LTS:
libspice-protocol-dev 0.12.10-1ubuntu0.2

Ubuntu 14.04 LTS:
libspice-server1 0.12.4-0nocelt2ubuntu1.7

After a standard system update you need to restart qemu guests to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3751-1
CVE-2018-10873

Package Information:
https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2
https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.2
https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7
--=-xPu/5u9JtxS7BijYbEbl
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=t4yF
-----END PGP SIGNATURE-----

--=-xPu/5u9JtxS7BijYbEbl--



--===============2261334799801105428==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============2261334799801105428==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung