CVE-2015-5260
07.06.2016, 14:06
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_hpc_node | 6.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server_eus | 6.7.z:z |
redhat | enterprise_linux_workstation | 6.0 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.04 |
spice_project | spice | 𝑥 ≤ 0.12.5 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_hpc_node | 7.0 |
redhat | enterprise_linux_hpc_node_eus | 7.1 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_eus | 7.1 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References