Updated spice-gtk packages fix security vulnerability
Publication date: 22 Feb 2019Type: security
Affected Mageia releases : 6
CVE: CVE-2017-12194 , CVE-2018-10873 , CVE-2018-10893
Description
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. (CVE-2017-12194) A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts. (CVE-2018-10873) Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code. (CVE-2018-10893)
References
- https://bugs.mageia.org/show_bug.cgi?id=23466
- https://lists.opensuse.org/opensuse-updates/2018-04/msg00011.html
- https://usn.ubuntu.com/3659-1/
- http://openwall.com/lists/oss-security/2018/08/17/1
- https://lists.opensuse.org/opensuse-updates/2018-09/msg00007.html
- https://lists.opensuse.org/opensuse-updates/2018-09/msg00010.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893
SRPMS
6/core
- spice-gtk-0.33-3.1.mga6