spice vulnerability

Related Vulnerabilities: CVE-2015-3247  

Spice could be made to crash or run programs.

Frediano Ziglio discovered that Spice incorrectly handled monitor configs. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile.

8 September 2015

spice vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Spice could be made to crash or run programs.

Software Description

  • spice - SPICE protocol client and server library

Details

Frediano Ziglio discovered that Spice incorrectly handled monitor configs. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04
libspice-server1 - 0.12.5-1ubuntu0.1
Ubuntu 14.04 LTS
libspice-server1 - 0.12.4-0nocelt2ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart all QEMU virtual machines using Spice to make the necessary changes.

References