spice vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Spice could be made to crash or run programs if it received specially crafted network traffic.

Software Description

  • spice - SPICE protocol client and server library

Details

Christophe Fergeau discovered that Spice incorrectly handled memory. A remote attacker could use this to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libspice-server1 - 0.14.0-1ubuntu4.2
Ubuntu 18.04 LTS
libspice-server1 - 0.14.0-1ubuntu2.4
Ubuntu 16.04 LTS
libspice-server1 - 0.12.6-4ubuntu0.4
Ubuntu 14.04 LTS
libspice-server1 - 0.12.4-0nocelt2ubuntu1.8

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart qemu guests to make all the necessary changes.

References


Read full article on Ubuntu Security


Encinitas, CA

www.n42.io