Updated spice packages fix security vulnerability
Publication date: 22 Feb 2019Modification date: 22 Feb 2019
Type: security
Affected Mageia releases : 6
CVE: CVE-2019-3813 , CVE-2018-10873 , CVE-2018-10893
Description
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers. (CVE-2019-3813) A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts. (CVE-2018-10873) Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code. (CVE-2018-10893)
References
- https://bugs.mageia.org/show_bug.cgi?id=24257
- https://www.openwall.com/lists/oss-security/2019/01/28/2
- https://access.redhat.com/errata/RHSA-2019:0231
- https://usn.ubuntu.com/3870-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/OWH2AHGKTPR5QUGXUYGY6CAEI3O7RPLL/
- http://openwall.com/lists/oss-security/2018/08/17/1
- https://lists.opensuse.org/opensuse-updates/2018-09/msg00007.html
- https://lists.opensuse.org/opensuse-updates/2018-09/msg00010.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893
SRPMS
6/core
- spice-0.13.90-1.2.mga6