Total vulnerabilities in the database
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux_server_eus | 6.7.z | 6.7.z.x |
redhat / enterprise_linux_hpc_node | 6.0 | 6.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 7.0 | 7.0.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 15.04 | 15.04.x |
spice_project / spice | - | 0.12.5.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_hpc_node | 7.0 | 7.0.x |
redhat / enterprise_linux_server_eus | 7.1 | 7.1.x |
redhat / enterprise_linux_hpc_node_eus | 7.1 | 7.1.x |