Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 10 of 29 results


CVE-2020-23793

Medium priority
Needs evaluation

An issue was discovered in spice-server spice-server-0.14.0-6.el7_6.1.x86_64 of Redhat's VDI product. There is a security vulnerablility that can restart KVMvirtual machine without any authorization. It is not yet known if there...

1 affected packages

spice

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice Not affected Not affected Not affected Needs evaluation Needs evaluation
Show less packages

CVE-2021-20201

Low priority
Vulnerable

A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.

3 affected packages

spice, spice-gtk, spice-protocol

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice Not affected Not affected Vulnerable Vulnerable Needs evaluation
spice-gtk Not affected Not affected Not affected Not affected Not affected
spice-protocol Not affected Not affected Not affected Not affected Not affected
Show less packages

CVE-2020-25653

Low priority

Some fixes available 11 of 12

A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting...

1 affected packages

spice-vdagent

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice-vdagent Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2020-25652

Low priority

Some fixes available 11 of 12

A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user...

1 affected packages

spice-vdagent

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice-vdagent Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2020-25651

Low priority

Some fixes available 11 of 12

A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users...

1 affected packages

spice-vdagent

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice-vdagent Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2020-25650

Low priority

Some fixes available 11 of 12

A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket...

1 affected packages

spice-vdagent

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice-vdagent Fixed Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2020-14355

Medium priority

Some fixes available 13 of 25

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These...

2 affected packages

spice, spice-gtk

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice Fixed Fixed Fixed Fixed Fixed
spice-gtk Vulnerable Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2019-15890

Low priority

Some fixes available 15 of 139

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

20 affected packages

android, basilisk2, bochs, fs-uae, libslirp...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
android Not in release Not in release Not in release Not in release Needs evaluation
basilisk2 Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
bochs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
fs-uae Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libslirp Not affected Not affected Not affected Not in release Not in release
ns3 Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
qemu Fixed Fixed Fixed Fixed Fixed
qemu-kvm Not in release Not in release Not in release Not in release Not in release
qemu-kvm-spice Not in release Not in release Not in release Not in release Not in release
qemu-linaro Not in release Not in release Not in release Not in release Not in release
redboot-imx Not in release Not in release Not in release Needs evaluation Needs evaluation
slirp Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
slirp4netns Not affected Not affected Not affected Not in release Not in release
vde2 Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
virtualbox Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
virtualbox-hwe Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
virtualbox-lts-vivid Not in release Not in release Not in release Not in release Not in release
virtualbox-lts-wily Not in release Not in release Not in release Not in release Not in release
virtualbox-lts-xenial Not in release Not in release Not in release Not in release Not in release
xen Not affected Not affected Not affected Not affected Not affected
Show all 20 packages Show less packages

CVE-2019-14378

Low priority

Some fixes available 15 of 93

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

13 affected packages

android, basilisk2, bochs, fs-uae, libslirp...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
android Not in release Not in release Not in release Not in release Needs evaluation
basilisk2 Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
bochs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
fs-uae Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libslirp Not affected Not affected Not affected Not in release Not in release
qemu Fixed Fixed Fixed Fixed Fixed
qemu-kvm Not in release Not in release Not in release Not in release Not in release
qemu-kvm-spice Not in release Not in release Not in release Not in release Not in release
qemu-linaro Not in release Not in release Not in release Not in release Not in release
slirp Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
slirp4netns Not affected Not affected Not affected Not in release Not in release
vde2 Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
xen Not affected Not affected Not affected Not affected Not affected
Show all 13 packages Show less packages

CVE-2019-3813

High priority
Fixed

Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.

3 affected packages

spice, spice-gtk, spice-protocol

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
spice Fixed Fixed
spice-gtk Not affected Not affected
spice-protocol Not affected Not affected
Show less packages