gentoo-full-overlay/metadata/glsa/glsa-202007-30.xml

51 lines
1.7 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202007-30">
<title>spice: Arbitrary code execution</title>
<synopsis>A buffer overread has been discovered in spice possibly allowing
remote execution of code.
</synopsis>
<product type="ebuild">spice</product>
<announced>2020-07-27</announced>
<revised count="1">2020-07-27</revised>
<bug>717776</bug>
<access>remote</access>
<affected>
<package name="app-emulation/spice" auto="yes" arch="*">
<unaffected range="ge">0.14.2</unaffected>
<vulnerable range="lt">0.14.2</vulnerable>
</package>
</affected>
<background>
<p>Provides a complete open source solution for remote access to virtual
machines in a seamless way so you can play videos, record audio, share
USB devices, and share folders without complications.
</p>
</background>
<description>
<p>A flaw in spices memory handling code has been discovered, allowing
an out of bounds read.
</p>
</description>
<impact type="normal">
<p>A remote attacker may be able to send malicious packets causing remote
code execution.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All spice users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-emulation/spice-0.14.2"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813</uri>
</references>
<metadata tag="requester" timestamp="2020-06-13T16:22:04Z">sam_c</metadata>
<metadata tag="submitter" timestamp="2020-07-27T00:23:35Z">sam_c</metadata>
</glsa>