ArchLinux: 201708-12: spice: arbitrary code execution
Summary
Two security issues have been found in spice <= 0.12.8, allowing a remote, authenticated user to get access to memory content by sending a number of monitors bigger than the number of items, and to trigger an integer overflow of the buffer_size variable, leading to a potentially exploitable buffer overflow.
Resolution
Upgrade to 0.12.8+8+ga957a90b-1.
# pacman -Syu "spice>=0.12.8+8+ga957a90b-1"
The problem has been fixed upstream but no release is available yet.
References
https://bugs.archlinux.org/task/54808 https://bugzilla.redhat.com/show_bug.cgi?id=1452606 https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=f1e7ec03e26ab6b8ca9b7ec060846a5b706a963d https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=ec6229c79abe05d731953df5f7e9a05ec9f6df79 https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=a957a90baf2c62d31f3547e56bba7d0e812d2331 https://security.archlinux.org/CVE-2017-7506
Workaround
None.