CVE-2020-14355

NameCVE-2020-14355
DescriptionMultiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2427-1, DLA-2428-1, DSA-4771-1
Debian Bugs971750, 971751

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spice (PTS)bullseye0.14.3-2.1fixed
bookworm0.15.1-1fixed
sid, trixie0.15.2-1fixed
spice-gtk (PTS)bullseye0.39-1fixed
bookworm0.42-1fixed
sid, trixie0.42-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spicesourcestretch0.12.8-2.1+deb9u4DLA-2427-1
spicesourcebuster0.14.0-1.3+deb10u1DSA-4771-1
spicesource(unstable)0.14.3-2971750
spice-gtksourcestretch0.33-3.3+deb9u2DLA-2428-1
spice-gtksource(unstable)0.39-1971751

Notes

[buster] - spice-gtk <no-dsa> (Minor issue)
https://gitlab.freedesktop.org/spice/spice-common/-/commit/762e0abae36033ccde658fd52d3235887b60862d
https://gitlab.freedesktop.org/spice/spice-common/-/commit/404d74782c8b5e57d146c5bf3118bb41bf3378e4
https://gitlab.freedesktop.org/spice/spice-common/-/commit/ef1b6ff7b82e15d759e5415b8e35b92bb1a4c206
https://gitlab.freedesktop.org/spice/spice-common/-/commit/b24fe6b66b86e601c725d30f00c37e684b6395b6

Search for package or bug name: Reporting problems