spice: add post-0.12.8 upstream security fixes
authorPeter Korsgaard <peter@korsgaard.com>
Wed, 21 Jun 2017 22:07:44 +0000 (00:07 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 22 Jun 2017 21:25:38 +0000 (23:25 +0200)
commit087e70498ab25c76cd8542100361f79af7580eb7
treee07f8d15460aaf9f5f4803a04ecf39aa96f8c36c
parent75057fe76742188455a5218b47cdf4116d84c268
spice: add post-0.12.8 upstream security fixes

Fixes the following security issues:

CVE-2016-9577

    Frediano Ziglio of Red Hat discovered a buffer overflow
    vulnerability in the main_channel_alloc_msg_rcv_buf function. An
    authenticated attacker can take advantage of this flaw to cause a
    denial of service (spice server crash), or possibly, execute
    arbitrary code.

CVE-2016-9578

    Frediano Ziglio of Red Hat discovered that spice does not properly
    validate incoming messages. An attacker able to connect to the
    spice server could send crafted messages which would cause the
    process to crash.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/spice/0001-Prevent-possible-DoS-attempts-during-protocol-handsh.patch [new file with mode: 0644]
package/spice/0002-Prevent-integer-overflows-in-capability-checks.patch [new file with mode: 0644]
package/spice/0003-main-channel-Prevent-overflow-reading-messages-from-.patch [new file with mode: 0644]