SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201606-05 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html | vendor advisory |
http://www.ubuntu.com/usn/USN-3014-1 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html | vendor advisory |
https://access.redhat.com/errata/RHSA-2016:1205 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1313496 | |
http://www.debian.org/security/2016/dsa-3596 | vendor advisory |
https://access.redhat.com/errata/RHSA-2016:1204 | vendor advisory |