Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <453db277-7542-4381-6cbd-8ed99e2af0e3@gentoo.org>
Date: Fri, 14 Jul 2017 09:36:21 +0200
From: Kristian Fiskerstrand <k_f@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2017-7506 spice: Possible buffer overflow via invalid monitor
 configurations

The following issue was brought to the distros list during the embargo
period. As per list policy this is the mandatory oss-security posting.

###

> CVE-2017-7506 spice: Possible buffer overflow via invalid monitor
configurations

CVSSv3:  9.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H

The vulnerability is exposed to authenticated clients.  Malicious SPICE
protocol messages can cause memory exhaustion, leak host memory to the
guest or cause OOB writes.  The writes seem difficult to control, but a
sufficiently crafty attacker could potentially use these to compromise
the host.

This was reported by SPICE maintainers Frediano Ziglio and Christophe
Fergeau, who also provided the attached patchset against the current
stable branch (0.12).

https://bugzilla.redhat.com/show_bug.cgi?id=1452606

-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3

View attachment "spice-CVE-2017-7506.patch" of type "text/x-patch" (5891 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.