Lucene search

K
debianDebianDEBIAN:DSA-4319-1:B3C5F
HistoryOct 15, 2018 - 7:01 p.m.

[SECURITY] [DSA 4319-1] spice security update

2018-10-1519:01:04
lists.debian.org
16

0.002 Low

EPSS

Percentile

54.9%


Debian Security Advisory DSA-4319-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
October 15, 2018 https://www.debian.org/security/faq


Package : spice
CVE ID : CVE-2018-10873
Debian Bug : 906315

Frediano Ziglio reported a missing check in the script to generate
demarshalling code in the SPICE protocol client and server library. The
generated demarshalling code is prone to multiple buffer overflows. An
authenticated attacker can take advantage of this flaw to cause a denial
of service (spice server crash), or possibly, execute arbitrary code.

For the stable distribution (stretch), this problem has been fixed in
version 0.12.8-2.1+deb9u2.

We recommend that you upgrade your spice packages.

For the detailed security status of spice please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/spice

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]