[USN-3751-1] Spice vulnerability


–===============2261334799801105428==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-xPu/5u9JtxS7BijYbEbl”

–=-xPu/5u9JtxS7BijYbEbl
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3751-1
August 22, 2018

spice, spice-protocol vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Spice could be made to crash if it received specially crafted network
traffic.

Software Description:
– spice: SPICE protocol client and server library
– spice-protocol: SPICE protocol headers

Details:

It was discovered that Spice incorrectly handled certain messages.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
=C2=A0 libspice-server1=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A00.14.0-1ubuntu2.2

Ubuntu 16.04 LTS:
=C2=A0 libspice-protocol-dev=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A00.12.10-1ubuntu0.2

Ubuntu 14.04 LTS:
=C2=A0 libspice-server1=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A00.12.4-0nocelt2ubuntu1.7

After a standard system update you need to restart qemu guests to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3751-1
=C2=A0 CVE-2018-10873

Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2
=C2=A0 https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0=
.2
=C2=A0 https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7
–=-xPu/5u9JtxS7BijYbEbl
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=t4yF
—–END PGP SIGNATURE—–

–=-xPu/5u9JtxS7BijYbEbl–

–===============2261334799801105428==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============2261334799801105428==–