oss-sec mailing list archives
CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations
From: Kristian Fiskerstrand <k_f () gentoo org>
Date: Fri, 14 Jul 2017 09:36:21 +0200
The following issue was brought to the distros list during the embargo period. As per list policy this is the mandatory oss-security posting. ###
CVE-2017-7506 spice: Possible buffer overflow via invalid monitor
configurations CVSSv3: 9.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H The vulnerability is exposed to authenticated clients. Malicious SPICE protocol messages can cause memory exhaustion, leak host memory to the guest or cause OOB writes. The writes seem difficult to control, but a sufficiently crafty attacker could potentially use these to compromise the host. This was reported by SPICE maintainers Frediano Ziglio and Christophe Fergeau, who also provided the attached patchset against the current stable branch (0.12). https://bugzilla.redhat.com/show_bug.cgi?id=1452606 -- Kristian Fiskerstrand OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
Attachment:
spice-CVE-2017-7506.patch
Description:
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations Kristian Fiskerstrand (Jul 14)