ALT-PU-2018-2432-1
Closed vulnerabilities
Published: 2013-08-20
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2013-4130
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- http://rhn.redhat.com/errata/RHSA-2013-1260.html
- http://seclists.org/oss-sec/2013/q3/115
- http://www.debian.org/security/2014/dsa-2839
- http://www.ubuntu.com/usn/USN-1926-1
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- http://rhn.redhat.com/errata/RHSA-2013-1260.html
- http://seclists.org/oss-sec/2013/q3/115
- http://www.debian.org/security/2014/dsa-2839
- http://www.ubuntu.com/usn/USN-1926-1
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
Published: 2016-06-07
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-5260
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
Severity: HIGH (7.2)
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: HIGH (7.8)
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
Published: 2016-06-07
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-5261
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
Severity: LOW (3.6)
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Severity: HIGH (7.1)
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
References:
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05