SPICE client and server library

Edit Package spice

The SPICE client provides access to a remote machine's display and devices.
The SPICE server library is used by virtualization software (eg kvm) to expose
a (virtual) machine's display and devices to a SPICE client.

Refresh
Refresh
Source Files
Filename Size Changed
0001-Validate-surface-bounding-box-before-using-it.patch 0000002285 2.23 KB
0001-worker-validate-correctly-surfaces.patch 0000004968 4.85 KB
0002-worker-avoid-double-free-or-double-create-of-surface.patch 0000001838 1.79 KB
0003-Define-a-constant-to-limit-data-from-guest.patch 0000001346 1.31 KB
0004-Fix-some-integer-overflow-causing-large-memory-alloc.patch 0000002907 2.84 KB
0005-Check-properly-surface-to-be-created.patch 0000002724 2.66 KB
0006-Fix-buffer-reading-overflow.patch 0000001300 1.27 KB
0007-Prevent-32-bit-integer-overflow-in-bitmap_consistent.patch 0000001809 1.77 KB
0008-Fix-race-condition-on-red_get_clip_rects.patch 0000001544 1.51 KB
0009-Fix-race-in-red_get_image.patch 0000003142 3.07 KB
0010-Fix-race-condition-in-red_get_string.patch 0000002197 2.15 KB
0011-Fix-integer-overflow-computing-glyph_size-in-red_get.patch 0000002686 2.62 KB
0012-Fix-race-condition-in-red_get_data_chunks_ptr.patch 0000002536 2.48 KB
0013-Prevent-memory-leak-if-red_get_data_chunks_ptr-fails.patch 0000002438 2.38 KB
0014-Prevent-DoS-from-guest-trying-to-allocate-too-much-d.patch 0000003782 3.69 KB
0015-Fix-some-possible-overflows-in-red_get_string-for-32.patch 0000001949 1.9 KB
0016-Make-sure-we-can-read-QXLPathSeg-structures.patch 0000001396 1.36 KB
0017-Avoid-race-condition-copying-segments-in-red_get_pat.patch 0000001091 1.07 KB
0018-Prevent-data_size-to-be-set-independently-from-data.patch 0000001093 1.07 KB
0019-Prevent-leak-if-size-from-red_get_data_chunks-don-t-.patch 0000001371 1.34 KB
cve-2015-3247.patch 0000004879 4.76 KB
password-length-check.patch 0000000848 848 Bytes
spice-0.12.5.tar.bz2 0001737169 1.66 MB
spice-Don-t-use-48kHz-for-playback-recording-rates.patch 0000002338 2.28 KB
spice.changes 0000009497 9.27 KB
spice.spec 0000005852 5.71 KB
Latest Revision
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 336760 from Cédric Bosdonnat's avatar Cédric Bosdonnat (cbosdonnat) (revision 4)
- Fix for CVE-2015-5260 and CVE-2015-5261.
  bsc#944787, bsc#948976
  Added patches:
    0001-Validate-surface-bounding-box-before-using-it.patch
    0001-worker-validate-correctly-surfaces.patch
    0002-worker-avoid-double-free-or-double-create-of-surface.patch
    0003-Define-a-constant-to-limit-data-from-guest.patch
    0004-Fix-some-integer-overflow-causing-large-memory-alloc.patch
    0005-Check-properly-surface-to-be-created.patch
    0006-Fix-buffer-reading-overflow.patch
    0007-Prevent-32-bit-integer-overflow-in-bitmap_consistent.patch
    0008-Fix-race-condition-on-red_get_clip_rects.patch
    0009-Fix-race-in-red_get_image.patch
    0010-Fix-race-condition-in-red_get_string.patch
    0011-Fix-integer-overflow-computing-glyph_size-in-red_get.patch
    0012-Fix-race-condition-in-red_get_data_chunks_ptr.patch
    0013-Prevent-memory-leak-if-red_get_data_chunks_ptr-fails.patch
    0014-Prevent-DoS-from-guest-trying-to-allocate-too-much-d.patch
    0015-Fix-some-possible-overflows-in-red_get_string-for-32.patch
    0016-Make-sure-we-can-read-QXLPathSeg-structures.patch
    0017-Avoid-race-condition-copying-segments-in-red_get_pat.patch
    0018-Prevent-data_size-to-be-set-independently-from-data.patch
    0019-Prevent-leak-if-size-from-red_get_data_chunks-don-t-.patch
Comments 0
openSUSE Build Service is sponsored by