[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Scientific Linux alert SLSA-2016:1205-1 (spice)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Important: spice on SL7.x x86_64
Date:  Tue, 7 Jun 2016 14:06:09 +0000
Message-ID:  <20160607140609.16782.18506@slpackages.fnal.gov>

Synopsis: Important: spice security update Advisory ID: SLSA-2016:1205-1 Issue Date: 2016-06-06 CVE Numbers: CVE-2016-0749 CVE-2016-2150 -- Security Fix(es): * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) -- SL7 x86_64 spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-0.12.4-15.el7_2.1.x86_64.rpm spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm - Scientific Linux Development Team


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds