ALT-PU-2019-1395-1
Closed vulnerabilities
BDU:2018-00028
Уязвимость библиотеки spice, связанная с переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-00441
Уязвимость функции write_validate_array_item() («demarshal.py») системы рендеринга удаленного виртуального «рабочего стола» SPICE (the Simple Protocol for Independent Computing Environments), связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-9577
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96040
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577
- https://www.debian.org/security/2017/dsa-3790
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96040
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577
- https://www.debian.org/security/2017/dsa-3790
Modified: 2024-11-21
CVE-2016-9578
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96118
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578
- https://www.debian.org/security/2017/dsa-3790
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96118
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578
- https://www.debian.org/security/2017/dsa-3790
Modified: 2025-04-20
CVE-2017-7506
spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
- http://www.debian.org/security/2017/dsa-3907
- http://www.openwall.com/lists/oss-security/2017/07/14/1
- http://www.securityfocus.com/bid/99583
- https://access.redhat.com/errata/RHSA-2017:2471
- https://access.redhat.com/errata/RHSA-2018:3522
- https://bugzilla.redhat.com/show_bug.cgi?id=1452606
- http://www.debian.org/security/2017/dsa-3907
- http://www.openwall.com/lists/oss-security/2017/07/14/1
- http://www.securityfocus.com/bid/99583
- https://access.redhat.com/errata/RHSA-2017:2471
- https://access.redhat.com/errata/RHSA-2018:3522
- https://bugzilla.redhat.com/show_bug.cgi?id=1452606
Modified: 2024-11-21
CVE-2018-10873
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
- http://www.securityfocus.com/bid/105152
- https://access.redhat.com/errata/RHSA-2018:2731
- https://access.redhat.com/errata/RHSA-2018:2732
- https://access.redhat.com/errata/RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10873
- https://gitlab.freedesktop.org/spice/spice-common/commit/bb15d4815ab586b4c4a20f4a565970a44824c42c
- https://lists.debian.org/debian-lts-announce/2018/08/msg00035.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00038.html
- https://usn.ubuntu.com/3751-1/
- https://www.debian.org/security/2018/dsa-4319
- http://www.securityfocus.com/bid/105152
- https://access.redhat.com/errata/RHSA-2018:2731
- https://access.redhat.com/errata/RHSA-2018:2732
- https://access.redhat.com/errata/RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10873
- https://gitlab.freedesktop.org/spice/spice-common/commit/bb15d4815ab586b4c4a20f4a565970a44824c42c
- https://lists.debian.org/debian-lts-announce/2018/08/msg00035.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00038.html
- https://usn.ubuntu.com/3751-1/
- https://www.debian.org/security/2018/dsa-4319