|
Message-ID: <453db277-7542-4381-6cbd-8ed99e2af0e3@gentoo.org> Date: Fri, 14 Jul 2017 09:36:21 +0200 From: Kristian Fiskerstrand <k_f@...too.org> To: oss-security@...ts.openwall.com Subject: CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations The following issue was brought to the distros list during the embargo period. As per list policy this is the mandatory oss-security posting. ### > CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations CVSSv3: 9.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H The vulnerability is exposed to authenticated clients. Malicious SPICE protocol messages can cause memory exhaustion, leak host memory to the guest or cause OOB writes. The writes seem difficult to control, but a sufficiently crafty attacker could potentially use these to compromise the host. This was reported by SPICE maintainers Frediano Ziglio and Christophe Fergeau, who also provided the attached patchset against the current stable branch (0.12). https://bugzilla.redhat.com/show_bug.cgi?id=1452606 -- Kristian Fiskerstrand OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 View attachment "spice-CVE-2017-7506.patch" of type "text/x-patch" (5891 bytes) Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.