You are here
Home > Preporuke > Sigurnosni nedostatak programskih paketa spice i spice-protocol

Sigurnosni nedostatak programskih paketa spice i spice-protocol

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3751-1
August 22, 2018

spice, spice-protocol vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Spice could be made to crash if it received specially crafted network
traffic.

Software Description:
– spice: SPICE protocol client and server library
– spice-protocol: SPICE protocol headers

Details:

It was discovered that Spice incorrectly handled certain messages.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  libspice-server1                0.14.0-1ubuntu2.2

Ubuntu 16.04 LTS:
  libspice-protocol-dev           0.12.10-1ubuntu0.2

Ubuntu 14.04 LTS:
  libspice-server1                0.12.4-0nocelt2ubuntu1.7

After a standard system update you need to restart qemu guests to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3751-1
  CVE-2018-10873

Package Information:
  https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.2
  https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.2
  https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.7—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=t4yF
—–END PGP SIGNATURE—–

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa postgresql

Otkriven je sigurnosni nedostatak u programskom paketu postgresql za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje sigurnosnih ograničenja,...

Close