spice: security bump to version 0.12.8
authorPeter Korsgaard <peter@korsgaard.com>
Wed, 21 Jun 2017 22:07:43 +0000 (00:07 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 22 Jun 2017 21:25:30 +0000 (23:25 +0200)
commit75057fe76742188455a5218b47cdf4116d84c268
treefd0533bf1d66c24cbd4f7e64fefdad8ae80758b3
parent622ff3d6ea63ca7c7aab7e5609cfb1e4190eff8a
spice: security bump to version 0.12.8

Fixes the following security issues:

CVE-2016-0749: The smartcard interaction in SPICE allows remote attackers to
cause a denial of service (QEMU-KVM process crash) or possibly execute
arbitrary code via vectors related to connecting to a guest VM, which
triggers a heap-based buffer overflow.

CVE-2016-2150: SPICE allows local guest OS users to read from or write to
arbitrary host memory locations via crafted primary surface parameters, a
similar issue to CVE-2015-5261.

The pyparsing check has been dropped from configure, and the spice protocol
definition is again included, so the workarounds can be removed.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/spice/spice.hash
package/spice/spice.mk