spice-0.12.4-9.el7.3
エラータID: AXSA:2015-509:01
リリース日:
2015/10/13 Tuesday - 15:35
題名:
spice-0.12.4-9.el7.3
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- 現時点では CVE-2015-5260, CVE-2015-5261 の情報が公開されておりません。
CVE の情報が公開され次第情報をアップデートいたします。
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2015-5260
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
CVE-2015-5261
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
追加情報:
N/A
ダウンロード:
SRPMS
- spice-0.12.4-9.el7.3.src.rpm
MD5: b552ea82e1c6d940292e28c2a5c22267
SHA-256: f22ef4ee24d58576f6627e2d8c94ad14a9a8029e0b4f5cdce4484de66cf6e794
Size: 1.71 MB
Asianux Server 7 for x86_64
- spice-server-0.12.4-9.el7.3.x86_64.rpm
MD5: f0aa4cd3647fce52c74e194ac712d427
SHA-256: 6bcbb4b79e08149d3cb4a76b64d806ef08d41e5ad6c55377153f8f642be08bc8
Size: 378.51 kB