Denial of Service in Spice
ID: | USN-3751-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS |
Datum: | Fr, 24. August 2018, 18:04 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873 |
Applikationen: | SPICE |
Originalnachricht |
|
--===============2261334799801105428== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-xPu/5u9JtxS7BijYbEbl" --=-xPu/5u9JtxS7BijYbEbl Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3751-1 August 22, 2018 spice, spice-protocol vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Spice could be made to crash if it received specially crafted network traffic. Software Description: - spice: SPICE protocol client and server library - spice-protocol: SPICE protocol headers Details: It was discovered that Spice incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: libspice-server1 0.14.0-1ubuntu2.2 Ubuntu 16.04 LTS: libspice-protocol-dev 0.12.10-1ubuntu0.2 Ubuntu 14.04 LTS: libspice-server1 0.12.4-0nocelt2ubuntu1.7 After a standard system update you need to restart qemu guests to make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3751-1 CVE-2018-10873 Package Information: https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2 https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.2 https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7 --=-xPu/5u9JtxS7BijYbEbl Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJbfbguAAoJEEW851uECx9puqwP/i2XNpd1SkhrOYBfzWA8WZZa iPGamD2s8MRLJOpl+Rh1d3BKESkMTtDL1u27YlPQ/ExiMHQqQE5qJX+DBq7Dhmsl wbY6tWj87sgTUFs/rC+yTaYmf2klE8LEXvSq6oPX1VScg0E2jeDDf/ClQRKp1w7T C4Sdej7sYS9KVZlrUVjc8ZUYOUSNTk5pGp+szOaU9VZ10EUmFSZbLgRV5L06eSH0 qpoDRjqZCO+YzCM2sVVTrRW14TN9+kGPOkd5ti0uUYZoNDio8LYmk90GRAhY5H19 qxM4l+lI6oCMmBxcB2c2reVFM8Hf7qKIuxZMfTe5EOKzC3yTMAiscZlWllKN8/bU vvb0rFei4vVAyM1mEXrH+RrQG0bsbbEeZzhGEB7XqiqBYmIjXOfnKwkjGIR0+/r7 qqjHNKfsivRJAZSL3XqgmwGU0o5X4SuZt3jG2uzdJIHZCzgmDAXA+rIE3Dg4+pEE G9w+S+ZLBUkthGYjYIn9F534THiC1lPBdmqIwcW4zNSRYRR1tIBsQkj89fRoHK8z CiH7C5vXaHgmhPnQpLRGx0u7oLzeRYkxS+O8s5OadlZeRAMh50VvIfhleHk941hu eeMuNcQv3fa1hBRQiLZVnGvcHj8BEX6PxQWpcOT7v8mhlcR3YrDz6mEqfyBKdhg3 KWaAgV3GnStNRg5VeO92 =t4yF -----END PGP SIGNATURE----- --=-xPu/5u9JtxS7BijYbEbl-- --===============2261334799801105428== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============2261334799801105428==-- |