Ubuntu alert USN-3355-1 (spice)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-3355-1] Spice vulnerability | |
Date: | Wed, 19 Jul 2017 13:18:56 -0400 | |
Message-ID: | <5199d298-787e-351e-0584-8da72361602a@canonical.com> |
========================================================================== Ubuntu Security Notice USN-3355-1 July 19, 2017 spice vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.04 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Spice could be made to crash or run programs if it received specially crafted network traffic. Software Description: - spice: SPICE protocol client and server library Details: Frediano Ziglio discovered that Spice incorrectly handled certain invalid monitor configurations. A remote attacker could use this issue to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.04: libspice-server1 0.12.8-2ubuntu1.1 Ubuntu 16.04 LTS: libspice-server1 0.12.6-4ubuntu0.3 Ubuntu 14.04 LTS: libspice-server1 0.12.4-0nocelt2ubuntu1.5 After a standard system update you need to restart qemu guests to make all the necessary changes. References: https://www.ubuntu.com/usn/usn-3355-1 CVE-2017-7506 Package Information: https://launchpad.net/ubuntu/+source/spice/0.12.8-2ubuntu1.1 https://launchpad.net/ubuntu/+source/spice/0.12.6-4ubuntu0.3 https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...