Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.130018
Category:Mageia Linux Local Security Checks
Title:Mageia Linux Local Check: mgasa-2015-0373
Summary:Mageia Linux Local Security Checks mgasa-2015-0373
Description:Summary:
Mageia Linux Local Security Checks mgasa-2015-0373

Vulnerability Insight:
Updated spice packages fix security vulnerability: A race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process (CVE-2015-3247).

Solution:
Update the affected packages to the latest available version.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-3247
Debian Security Information: DSA-3354 (Google Search)
http://www.debian.org/security/2015/dsa-3354
http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
RedHat Security Advisories: RHSA-2015:1713
http://rhn.redhat.com/errata/RHSA-2015-1713.html
RedHat Security Advisories: RHSA-2015:1714
http://rhn.redhat.com/errata/RHSA-2015-1714.html
RedHat Security Advisories: RHSA-2015:1715
http://rhn.redhat.com/errata/RHSA-2015-1715.html
http://www.securitytracker.com/id/1033459
http://www.securitytracker.com/id/1033460
http://www.securitytracker.com/id/1033753
SuSE Security Announcement: openSUSE-SU-2015:1566 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html
http://www.ubuntu.com/usn/USN-2736-1
CopyrightCopyright (C) 2015 Eero Volotinen

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.