Operating System:

[Debian]

Published:

09 September 2015

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2356
                           spice security update
                             9 September 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           spice
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-3247  

Reference:         ESB-2015.2317
                   ESB-2015.2313

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3354

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3354-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 08, 2015                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : spice
CVE ID         : CVE-2015-3247
Debian Bug     : 797976

Frediano Ziglio of Red Hat discovered a race condition flaw in spice's
worker_update_monitors_config() function, leading to a heap-based memory
corruption. A malicious user in a guest can take advantage of this flaw
to cause a denial of service (QEMU process crash) or, potentially
execute arbitrary code on the host with the privileges of the hosting
QEMU process.

For the stable distribution (jessie), this problem has been fixed in
version 0.12.5-1+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 0.12.5-1.2.

We recommend that you upgrade your spice packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=yi4J
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9vRf
-----END PGP SIGNATURE-----