Описание
Security update for spice
This update for spice fixes the following issues:
- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC decoding code (bsc#1177158)
- CVE-2016-2150: Fixed a guest escape using crafted primary surface parameters (bsc#982386)
Список пакетов
SUSE Linux Enterprise Server 11 SP4-LTSS
Ссылки
- Link for SUSE-SU-2021:14744-1
- E-Mail link for SUSE-SU-2021:14744-1
- SUSE Security Ratings
- SUSE Bug 1177158
- SUSE Bug 1181686
- SUSE Bug 982386
- SUSE CVE CVE-2016-2150 page
- SUSE CVE CVE-2020-14355 page
- SUSE CVE CVE-2021-20201 page
Описание
SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
Затронутые продукты
Ссылки
- CVE-2016-2150
- SUSE Bug 982385
- SUSE Bug 982386
Описание
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
Затронутые продукты
Ссылки
- CVE-2020-14355
- SUSE Bug 1177158
Описание
A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
Затронутые продукты
Ссылки
- CVE-2021-20201
- SUSE Bug 1181686