Bug 1313496 (CVE-2016-2150) - CVE-2016-2150 spice: Host memory access from guest with invalid primary surface parameters
Summary: CVE-2016-2150 spice: Host memory access from guest with invalid primary surfa...
Status: CLOSED ERRATA
Alias: CVE-2016-2150
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20160606,repo...
Keywords: Security
Depends On: 1316491 1316492 1316493 1316495 1343135
Blocks: 1313499
TreeView+ depends on / blocked
 
Reported: 2016-03-01 17:26 UTC by Adam Mariš
Modified: 2019-06-08 21:02 UTC (History)
6 users (show)

(edit)
A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host.
Clone Of:
(edit)
Last Closed: 2016-12-09 06:24:32 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1204 normal SHIPPED_LIVE Important: spice-server security update 2016-06-06 19:55:10 UTC
Red Hat Product Errata RHSA-2016:1205 normal SHIPPED_LIVE Important: spice security update 2016-06-06 19:55:01 UTC

Description Adam Mariš 2016-03-01 17:26:03 UTC
It was found that one malicious guest inside a virtual machine can take control of the corresponding Qemu process in the host using crafted primary surface parameters. This issue is similar to CVE-2015-5261, but it's using different path in the code.

Comment 4 Martin Prpič 2016-06-01 08:37:41 UTC
Acknowledgments:

Name: Frediano Ziglio (Red Hat)

Comment 5 Stefan Cornelius 2016-06-06 15:16:56 UTC
Created spice tracking bugs for this issue:

Affects: fedora-all [bug 1343135]

Comment 6 errata-xmlrpc 2016-06-06 15:55:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1205 https://access.redhat.com/errata/RHSA-2016:1205

Comment 7 errata-xmlrpc 2016-06-06 15:55:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:1204 https://access.redhat.com/errata/RHSA-2016:1204


Note You need to log in before you can comment on or make changes to this bug.