Ubuntu 6300 Published by

The following security updates has been released for Ubuntu Linux:

USN-3598-2: curl vulnerabilities
USN-3659-1: Spice vulnerability



USN-3598-2: curl vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3598-2
May 24, 2018

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-3598-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 Phan Thanh discovered that curl incorrectly handled certain FTP paths.
 An attacker could use this to cause a denial of service or possibly
 execute arbitrary code. (CVE-2018-1000120)

 Dario Weisser discovered that curl incorrectly handled certain LDAP
 URLs. An attacker could possibly use this issue to cause a denial of
 service. (CVE-2018-1000121)

 Max Dymond discovered that curl incorrectly handled certain RTSP data.
 An attacker could possibly use this to cause a denial of service or
 even to get access to sensitive data. (CVE-2018-1000122)

 Max Dymond discovered that curl incorrectly handled certain RTSP
 responses. If a user or automated system were tricked into connecting
 to a malicious server, a remote attacker could use this issue to cause
 curl to crash, resulting in a denial of service, or possibly obtain
 sensitive information. (CVE-2018-1000301)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  curl 7.22.0-3ubuntu4.21
  libcurl3 7.22.0-3ubuntu4.21
  libcurl3-gnutls 7.22.0-3ubuntu4.21
  libcurl3-nss 7.22.0-3ubuntu4.21

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3598-2
  https://usn.ubuntu.com/usn/usn-3598-1
  CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301

USN-3659-1: Spice vulnerability


==========================================================================
Ubuntu Security Notice USN-3659-1
May 23, 2018

spice, spice-protocol vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Spice could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
- spice: SPICE protocol client and server library
- spice-protocol: SPICE protocol headers

Details:

Frediano Ziglio discovered that Spice incorrectly handled certain
client messages. An attacker could possibly use this to cause Spice to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  libspice-server1 0.14.0-1ubuntu2.1

Ubuntu 17.10:
  libspice-server1 0.12.8-2.2ubuntu0.1

Ubuntu 16.04 LTS:
  libspice-protocol-dev 0.12.10-1ubuntu0.1

Ubuntu 14.04 LTS:
  libspice-server1 0.12.4-0nocelt2ubuntu1.6

After a standard system update you need to restart qemu guests to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3659-1
  CVE-2017-12194

Package Information:
  https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.1
  https://launchpad.net/ubuntu/+source/spice/0.12.8-2.2ubuntu0.1
  https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.6