Mageia 2019-0100: spice security update
Summary
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds
read due to an off-by-one error in memslot_get_virt. This may lead to a
denial of service, or, in the worst case, code-execution by unauthenticated
attackers. (CVE-2019-3813)
A vulnerability was discovered in SPICE before version 0.14.1 where the
generated code used for demarshalling messages lacked sufficient bounds
checks. A malicious client or server, after authentication, could send
specially crafted messages to its peer which would result in a crash or,
potentially, other impacts. (CVE-2018-10873)
Multiple integer overflow and buffer overflow issues were discovered in
spice-client's handling of LZ compressed frames. A malicious server could
cause the client to crash or, potentially, execute arbitrary code.
(CVE-2018-10893)
References
- https://bugs.mageia.org/show_bug.cgi?id=24257
- https://www.openwall.com/lists/oss-security/2019/01/28/2
- https://access.redhat.com/errata/RHSA-2019:0231
- https://ubuntu.com/security/notices/USN-3870-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/OWH2AHGKTPR5QUGXUYGY6CAEI3O7RPLL/
- https://www.openwall.com/lists/oss-security/2018/08/17/1
- - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893
Resolution
MGASA-2019-0100 - Updated spice packages fix security vulnerability
SRPMS
- 6/core/spice-0.13.90-1.2.mga6