Bug 1399566 (CVE-2016-9578)
Summary: | CVE-2016-9578 spice: Remote DoS via crafted message | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alexl, alon, bmcclain, cfergeau, cperry, dblechte, dfediuck, dmoppert, dougsland, eedri, fdeutsch, hdegoede, jforbes, lsurette, marcandre.lureau, mgoldboi, michal.skrivanek, mkenneth, pstehlik, rbarry, Rhev-m-bugs, rh-spice-bugs, sandmann, sbonazzo, security-response-team, sherold, srevivo, uril, virt-maint, ycui, ykaul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | spice 0.13.90 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was discovered in SPICE in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:02:43 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1399161, 1403046, 1403047, 1403048, 1403049, 1419134 | ||
Bug Blocks: | 1399568, 1419717 |
Description
Adam Mariš
2016-11-29 10:19:14 UTC
Acknowledgments: Name: Frediano Ziglio (Red Hat) According to Errata this is no more under Embargo. Before pushing the patches publicly, it this true? Was the errata released? Hi Christophe, errata are nearly ready for push, so I'm targetting an unembargo date of 2017-02-06 (Monday). If this date works for you, please let me know and I'll arrange notification to other distributions via linux-distros and include copies of the patches against trunk from bug 1401038, bug 1399161. Apologies for the delays and confusion with this - people being away with shutdown, PTO and devconf, and my own mis-handling of the errata, made this take longer than it should have. Thanks for your patience and communication throughout! Yup, sounds good to me, thanks for the update! This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0254 https://rhn.redhat.com/errata/RHSA-2017-0254.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0253 https://rhn.redhat.com/errata/RHSA-2017-0253.html This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:0552 https://access.redhat.com/errata/RHSA-2017:0552 This issue has been addressed in the following products: RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:0549 https://rhn.redhat.com/errata/RHSA-2017-0549.html |