ASA-201708-12 log original external raw

[ASA-201708-12] spice: arbitrary code execution
Arch Linux Security Advisory ASA-201708-12 ========================================== Severity: High Date : 2017-08-14 CVE-ID : CVE-2017-7506 Package : spice Type : arbitrary code execution Remote : Yes Link : Summary ======= The package spice before version 0.12.8+8+ga957a90b-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 0.12.8+8+ga957a90b-1. # pacman -Syu "spice>=0.12.8+8+ga957a90b-1" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== Two security issues have been found in spice <= 0.12.8, allowing a remote, authenticated user to get access to memory content by sending a number of monitors bigger than the number of items, and to trigger an integer overflow of the buffer_size variable, leading to a potentially exploitable buffer overflow. Impact ====== A remote, authenticated attacker can access sensitive information or execute arbitrary code on the affected host. References ==========