SCIENTIFIC-LINUX-ERRATA Archives

June 2016

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Kevin Hill <[log in to unmask]>
Reply To:
Date:
Thu, 16 Jun 2016 21:10:38 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (33 lines)
Synopsis:          Important: spice-server security update
Advisory ID:       SLSA-2016:1204-1
Issue Date:        2016-06-06
CVE Numbers:       CVE-2016-0749
                   CVE-2016-2150
--

Security Fix(es):

* A memory allocation flaw, leading to a heap-based buffer overflow, was
found in spice's smartcard interaction, which runs under the QEMU-KVM
context on the host. A user connecting to a guest VM using spice could
potentially use this flaw to crash the QEMU-KVM process or execute
arbitrary code with the privileges of the host's QEMU-KVM process.
(CVE-2016-0749)

* A memory access flaw was found in the way spice handled certain guests
using crafted primary surface parameters. A user in a guest could use this
flaw to read from and write to arbitrary memory locations on the host.
(CVE-2016-2150)

The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the
CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
--

SL6
  x86_64
    spice-server-0.12.4-13.el6.1.x86_64.rpm
    spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm
    spice-server-devel-0.12.4-13.el6.1.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2