Описание
Security update for spice
spice was updated to fix two security issues.
These security issues were fixed:
- CVE-2016-2150: SPICE allowed local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261 (boo#982385).
- CVE-2016-0749: The smartcard interaction in SPICE allowed remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow (boo#982385).
Список пакетов
openSUSE Leap 42.1
libspice-server-devel-0.12.5-8.1
libspice-server1-0.12.5-8.1
spice-0.12.5-8.1
spice-client-0.12.5-8.1
Ссылки
- E-Mail link for openSUSE-SU-2016:1726-1
- SUSE Security Ratings
Описание
The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
Затронутые продукты
openSUSE Leap 42.1:libspice-server-devel-0.12.5-8.1
openSUSE Leap 42.1:libspice-server1-0.12.5-8.1
openSUSE Leap 42.1:spice-0.12.5-8.1
openSUSE Leap 42.1:spice-client-0.12.5-8.1
Ссылки
- CVE-2016-0749
- SUSE Bug 982385
- SUSE Bug 982386
Описание
SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
Затронутые продукты
openSUSE Leap 42.1:libspice-server-devel-0.12.5-8.1
openSUSE Leap 42.1:libspice-server1-0.12.5-8.1
openSUSE Leap 42.1:spice-0.12.5-8.1
openSUSE Leap 42.1:spice-client-0.12.5-8.1
Ссылки
- CVE-2016-2150
- SUSE Bug 982385
- SUSE Bug 982386