MGASA-2019-0099

Source
https://advisories.mageia.org/MGASA-2019-0099.html
Import Source
https://advisories.mageia.org/MGASA-2019-0099.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0099
Related
Published
2019-02-22T01:08:50Z
Modified
2019-02-22T00:07:12Z
Summary
Updated spice-gtk packages fix security vulnerability
Details

A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. (CVE-2017-12194)

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts. (CVE-2018-10873)

Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code. (CVE-2018-10893)

References
Credits

Affected packages

Mageia:6 / spice-gtk

Package

Name
spice-gtk
Purl
pkg:rpm/mageia/spice-gtk?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.33-3.1.mga6

Ecosystem specific

{
    "section": "core"
}