Bug 47755 - spice: Multiple issues (4.2)
spice: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
All Linux
: P3 normal (vote)
: UCS 4.2-4-errata
Assigned To: Quality Assurance
Arvid Requate
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-09-04 18:29 CEST by Arvid Requate
Modified: 2018-09-05 13:17 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2018-09-04 18:29:27 CEST
New Debian spice 0.12.5-1+deb8u6 fixes:
This update addresses the following issue(s):
* 
* Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873)
Comment 1 Quality Assurance univentionstaff 2018-09-04 18:55:31 CEST
--- mirror/ftp/4.2/unmaintained/4.2-4/source/spice_0.12.5-1+deb8u5.dsc
+++ apt/ucs_4.2-0-errata4.2-4/source/spice_0.12.5-1+deb8u6.dsc
@@ -1,3 +1,20 @@
+0.12.5-1+deb8u6 [Fri, 31 Aug 2018 20:44:48 +0200] Mike Gabriel <sunweaver@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2018-10873:
+    A vulnerability was discovered in SPICE before version 0.14.1 where
+    the generated code used for demarshalling messages lacked sufficient
+    bounds checks. A malicious client or server, after authentication,
+    could send specially crafted messages to its peer which would result
+    in a crash or, potentially, other impacts.
+    .
+    Fix: Bail out with an error if the pointer to the start of some
+    message data is strictly greater than the pointer to the end of the 
+    message data.
+    .
+    See review comments in debian/patches/CVE-2018-10873.patch about
+    potential weaknesses of this fix.
+
 0.12.5-1+deb8u5 [Tue, 04 Jul 2017 21:22:06 +0200] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Non-maintainer upload by the Security Team.

<http://10.200.17.11/4.2-4/#1945788768383152096>
Comment 2 Arvid Requate univentionstaff 2018-09-04 20:31:21 CEST
The upstream package has been copied. No UCS specific patches.

The piuparts result and advisory look ok.
Comment 3 Arvid Requate univentionstaff 2018-09-05 13:17:22 CEST
<http://errata.software-univention.de/ucs/4.2/506.html>