Home / mailingsPDF  

[SECURITY] [DSA 3596-1] spice security update

Posted on 06 June 2016
Debian Security Advisory

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3596-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 06, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : spice
CVE ID : CVE-2016-0749 CVE-2016-2150

Several vulnerabilities were discovered in spice, a SPICE protocol
client and server library. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2016-0749

Jing Zhao of Red Hat discovered a memory allocation flaw, leading to
a heap-based buffer overflow in spice's smartcard interaction. A
user connecting to a guest VM via spice can take advantage of this
flaw to cause a denial-of-service (QEMU process crash), or
potentially to execute arbitrary code on the host with the
privileges of the hosting QEMU process.

CVE-2016-2150

Frediano Ziglio of Red Hat discovered that a malicious guest inside
a virtual machine can take control of the corresponding QEMU process
in the host using crafted primary surface parameters.

For the stable distribution (jessie), these problems have been fixed in
version 0.12.5-1+deb8u3.

We recommend that you upgrade your spice packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

 

TOP