ID CVE-2016-2150
Summary SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux (RHEL) 7.0 (7)
    cpe:2.3:o:redhat:enterprise_linux:7.0
  • cpe:2.3:o:redhat:enterprise_linux:7.0:-:-:-:scientific_computing
    cpe:2.3:o:redhat:enterprise_linux:7.0:-:-:-:scientific_computing
  • Red Hat Enterprise Linux Server EUS 7.2
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2
  • Red Hat Enterprise Linux Server AUS 7.2
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • Red Hat Enterprise Linux HPC Node EUS 7.2
    cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
  • Novell openSUSE 13.2
    cpe:2.3:o:novell:opensuse:13.2
  • Novell Leap 42.1
    cpe:2.3:o:novell:leap:42.1
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Red Hat Enterprise Linux 6
    cpe:2.3:o:redhat:enterprise_linux:6
  • cpe:2.3:o:redhat:enterprise_linux:6.0:-:-:-:scientific_computing
    cpe:2.3:o:redhat:enterprise_linux:6.0:-:-:-:scientific_computing
  • Red Hat Enterprise Linux Workstation 6.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
  • Red Hat Enterprise Linux Server 6.0
    cpe:2.3:o:redhat:enterprise_linux_server:6.0
  • Red Hat Enterprise Linux Desktop 6.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
  • cpe:2.3:a:spice_project:spice
    cpe:2.3:a:spice_project:spice
CVSS
Base: 3.6 (as of 14-07-2016 - 14:30)
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201606-05.NASL
    description The remote host is affected by the vulnerability described in GLSA-201606-05 (spice: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in spice, please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code. Additionally, a local attacker could cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2017-10-29
    modified 2016-10-10
    plugin id 91638
    published 2016-06-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91638
    title GLSA-201606-05 : spice: Multiple vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-531.NASL
    description A vulnerability has been found in the Simple Protocol for Independent Computing Environments, SPICE. Frediano Ziglio from Red Hat discovered that SPICE allowed local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters. For Debian 7 'Wheezy', this problem has been fixed in version 0.11.0-1+deb7u3. We recommend you to upgrade your spice packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-12-06
    plugin id 91859
    published 2016-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91859
    title Debian DLA-531-1 : spice security update
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-1204.NASL
    description An update for spice-server is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2017-01-10
    plugin id 91495
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91495
    title RHEL 6 : spice-server (RHSA-2016:1204)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2016-1204.NASL
    description From Red Hat Security Advisory 2016:1204 : An update for spice-server is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2016-12-07
    plugin id 91493
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91493
    title Oracle Linux 6 : spice-server (ELSA-2016-1204)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2016-1205.NASL
    description From Red Hat Security Advisory 2016:1205 : An update for spice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2016-12-07
    plugin id 91494
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91494
    title Oracle Linux 7 : spice (ELSA-2016-1205)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-A7322C9FD1.NASL
    description Update to new 0.12.8 upstream release Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-10-18
    plugin id 93032
    published 2016-08-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93032
    title Fedora 23 : spice (2016-a7322c9fd1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2016-1204.NASL
    description An update for spice-server is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2016-11-17
    plugin id 91503
    published 2016-06-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91503
    title CentOS 6 : spice-server (CESA-2016:1204)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20160606_SPICE_ON_SL7_X.NASL
    description Security Fix(es) : - A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) - A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150)
    last seen 2017-10-29
    modified 2016-10-19
    plugin id 91514
    published 2016-06-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91514
    title Scientific Linux Security Update : spice on SL7.x x86_64
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-824.NASL
    description spice was updated to fix two security issues. These security issues were fixed : - CVE-2016-2150: SPICE allowed local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261 (boo#982385). - CVE-2016-0749: The smartcard interaction in SPICE allowed remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow (boo#982385).
    last seen 2017-10-29
    modified 2016-10-13
    plugin id 91944
    published 2016-07-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91944
    title openSUSE Security Update : spice (openSUSE-2016-824)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-823.NASL
    description spice was updated to fix two security issues. These security issues were fixed : - CVE-2016-2150: SPICE allowed local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261 (boo#982385). - CVE-2016-0749: The smartcard interaction in SPICE allowed remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow (boo#982385).
    last seen 2017-10-29
    modified 2016-10-13
    plugin id 91943
    published 2016-07-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91943
    title openSUSE Security Update : spice (openSUSE-2016-823)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3014-1.NASL
    description Jing Zhao discovered that the Spice smartcard support incorrectly handled memory. A remote attacker could use this issue to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2016-0749) Frediano Ziglio discovered that Spice incorrectly handled certain primary surface parameters. A malicious guest operating system could potentially exploit this issue to escape virtualization. (CVE-2016-2150). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-12-01
    plugin id 91758
    published 2016-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91758
    title Ubuntu 14.04 LTS / 15.10 / 16.04 LTS : spice vulnerabilities (USN-3014-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2016-1205.NASL
    description An update for spice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2016-11-17
    plugin id 91504
    published 2016-06-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91504
    title CentOS 7 : spice (CESA-2016:1205)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-1559-1.NASL
    description spice was updated to fix four security issues. These security issues were fixed : - CVE-2016-2150: Guest escape using crafted primary surface parameters (bsc#982386). - CVE-2016-0749: Heap-based buffer overflow in smartcard interaction (bsc#982385). - CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944787). - CVE-2015-5261: Host memory access from guest using crafted images (bsc#948976). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-12-27
    plugin id 91659
    published 2016-06-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91659
    title SUSE SLED12 / SLES12 Security Update : spice (SUSE-SU-2016:1559-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20160606_SPICE_SERVER_ON_SL6_X.NASL
    description Security Fix(es) : - A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) - A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2016-10-19
    plugin id 91647
    published 2016-06-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91647
    title Scientific Linux Security Update : spice-server on SL6.x x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-1561-1.NASL
    description spice was updated to fix two security issues. These security issues were fixed : - CVE-2016-2150: Guest escape using crafted primary surface parameters (bsc#982386). - CVE-2016-0749: Heap-based buffer overflow in smartcard interaction (bsc#982385). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-12-27
    plugin id 91661
    published 2016-06-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91661
    title SUSE SLED12 / SLES12 Security Update : spice (SUSE-SU-2016:1561-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-1205.NASL
    description An update for spice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es) : * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
    last seen 2017-10-29
    modified 2017-01-10
    plugin id 91496
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91496
    title RHEL 7 : spice (RHSA-2016:1205)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3596.NASL
    description Several vulnerabilities were discovered in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2016-0749 Jing Zhao of Red Hat discovered a memory allocation flaw, leading to a heap-based buffer overflow in spice's smartcard interaction. A user connecting to a guest VM via spice can take advantage of this flaw to cause a denial-of-service (QEMU process crash), or potentially to execute arbitrary code on the host with the privileges of the hosting QEMU process. - CVE-2016-2150 Frediano Ziglio of Red Hat discovered that a malicious guest inside a virtual machine can take control of the corresponding QEMU process in the host using crafted primary surface parameters.
    last seen 2017-10-29
    modified 2016-12-06
    plugin id 91490
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91490
    title Debian DSA-3596-1 : spice - security update
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-6B9C658707.NASL
    description Update to upstream 0.12.8 release Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2016-10-18
    plugin id 92443
    published 2016-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=92443
    title Fedora 24 : spice (2016-6b9c658707)
redhat via4
advisories
  • bugzilla
    id 1313496
    title CVE-2016-2150 spice: Host memory access from guest with invalid primary surface parameters
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment spice-server is earlier than 0:0.12.4-13.el6.1
          oval oval:com.redhat.rhsa:tst:20161204005
        • comment spice-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131192006
      • AND
        • comment spice-server-devel is earlier than 0:0.12.4-13.el6.1
          oval oval:com.redhat.rhsa:tst:20161204007
        • comment spice-server-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131192008
    rhsa
    id RHSA-2016:1204
    released 2016-06-06
    severity Important
    title RHSA-2016:1204: spice-server security update (Important)
  • bugzilla
    id 1313496
    title CVE-2016-2150 spice: Host memory access from guest with invalid primary surface parameters
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment spice is earlier than 0:0.12.4-15.el7_2.1
          oval oval:com.redhat.rhsa:tst:20161205009
        • comment spice is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20151714010
      • AND
        • comment spice-server is earlier than 0:0.12.4-15.el7_2.1
          oval oval:com.redhat.rhsa:tst:20161205005
        • comment spice-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131192006
      • AND
        • comment spice-server-devel is earlier than 0:0.12.4-15.el7_2.1
          oval oval:com.redhat.rhsa:tst:20161205007
        • comment spice-server-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131192008
    rhsa
    id RHSA-2016:1205
    released 2016-06-06
    severity Important
    title RHSA-2016:1205: spice security update (Important)
rpms
  • spice-server-0:0.12.4-13.el6.1
  • spice-server-devel-0:0.12.4-13.el6.1
  • spice-0:0.12.4-15.el7_2.1
  • spice-server-0:0.12.4-15.el7_2.1
  • spice-server-devel-0:0.12.4-15.el7_2.1
refmap via4
confirm
debian DSA-3596
gentoo GLSA-201606-05
suse
  • openSUSE-SU-2016:1725
  • openSUSE-SU-2016:1726
ubuntu USN-3014-1
Last major update 29-11-2016 - 22:04
Published 09-06-2016 - 12:59
Back to Top