Ubuntu Security Notice 2736-1 - Frediano Ziglio discovered that Spice incorrectly handled monitor configs. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile.
7198335bfdc3a5479ff70cf093ab5c6e873bf28bd1f3f11a4701e6b9421355d9
============================================================================
Ubuntu Security Notice USN-2736-1
September 08, 2015
spice vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary:
Spice could be made to crash or run programs.
Software Description:
- spice: SPICE protocol client and server library
Details:
Frediano Ziglio discovered that Spice incorrectly handled monitor configs.
A malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libspice-server1 0.12.5-1ubuntu0.1
Ubuntu 14.04 LTS:
libspice-server1 0.12.4-0nocelt2ubuntu1.1
After a standard system update you need to restart all QEMU virtual
machines using Spice to make the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2736-1
CVE-2015-3247
Package Information:
https://launchpad.net/ubuntu/+source/spice/0.12.5-1ubuntu0.1
https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.1