CVE-2020-14355

NameCVE-2020-14355
DescriptionMultiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4771-1
Debian Bugs971750, 971751

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spice (PTS)stretch (security), stretch0.12.8-2.1+deb9u3vulnerable
buster0.14.0-1.3vulnerable
buster (security)0.14.0-1.3+deb10u1fixed
bullseye, sid0.14.3-1vulnerable
spice-gtk (PTS)stretch0.33-3.3+deb9u1vulnerable
buster0.35-2vulnerable
bullseye, sid0.38-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spicesourcebuster0.14.0-1.3+deb10u1DSA-4771-1
spicesource(unstable)(unfixed)971750
spice-gtksource(unstable)(unfixed)971751

Notes

[buster] - spice-gtk <no-dsa> (Minor issue)
https://gitlab.freedesktop.org/spice/spice-common/-/commit/762e0abae36033ccde658fd52d3235887b60862d
https://gitlab.freedesktop.org/spice/spice-common/-/commit/404d74782c8b5e57d146c5bf3118bb41bf3378e4
https://gitlab.freedesktop.org/spice/spice-common/-/commit/ef1b6ff7b82e15d759e5415b8e35b92bb1a4c206
https://gitlab.freedesktop.org/spice/spice-common/-/commit/b24fe6b66b86e601c725d30f00c37e684b6395b6

Search for package or bug name: Reporting problems