lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 06 Jun 2016 17:04:49 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3596-1] spice security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3596-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
June 06, 2016                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : spice
CVE ID         : CVE-2016-0749 CVE-2016-2150

Several vulnerabilities were discovered in spice, a SPICE protocol
client and server library. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2016-0749

    Jing Zhao of Red Hat discovered a memory allocation flaw, leading to
    a heap-based buffer overflow in spice's smartcard interaction. A
    user connecting to a guest VM via spice can take advantage of this
    flaw to cause a denial-of-service (QEMU process crash), or
    potentially to execute arbitrary code on the host with the
    privileges of the hosting QEMU process.

CVE-2016-2150

    Frediano Ziglio of Red Hat discovered that a malicious guest inside
    a virtual machine can take control of the corresponding QEMU process
    in the host using crafted primary surface parameters.

For the stable distribution (jessie), these problems have been fixed in
version 0.12.5-1+deb8u3.

We recommend that you upgrade your spice packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=WUfj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ