Bug 47755

Summary: spice: Multiple issues (4.2)
Product: UCS Reporter: Arvid Requate <requate>
Component: Security updatesAssignee: Quality Assurance <qa>
Status: CLOSED FIXED QA Contact: Arvid Requate <requate>
Severity: normal    
Priority: P3    
Version: UCS 4.2   
Target Milestone: UCS 4.2-4-errata   
Hardware: All   
OS: Linux   
What kind of report is it?: Security Issue What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score: 8.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H)

Description Arvid Requate univentionstaff 2018-09-04 18:29:27 CEST
New Debian spice 0.12.5-1+deb8u6 fixes:
This update addresses the following issue(s):
* 
* Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873)
Comment 1 Quality Assurance univentionstaff 2018-09-04 18:55:31 CEST
--- mirror/ftp/4.2/unmaintained/4.2-4/source/spice_0.12.5-1+deb8u5.dsc
+++ apt/ucs_4.2-0-errata4.2-4/source/spice_0.12.5-1+deb8u6.dsc
@@ -1,3 +1,20 @@
+0.12.5-1+deb8u6 [Fri, 31 Aug 2018 20:44:48 +0200] Mike Gabriel <sunweaver@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2018-10873:
+    A vulnerability was discovered in SPICE before version 0.14.1 where
+    the generated code used for demarshalling messages lacked sufficient
+    bounds checks. A malicious client or server, after authentication,
+    could send specially crafted messages to its peer which would result
+    in a crash or, potentially, other impacts.
+    .
+    Fix: Bail out with an error if the pointer to the start of some
+    message data is strictly greater than the pointer to the end of the 
+    message data.
+    .
+    See review comments in debian/patches/CVE-2018-10873.patch about
+    potential weaknesses of this fix.
+
 0.12.5-1+deb8u5 [Tue, 04 Jul 2017 21:22:06 +0200] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Non-maintainer upload by the Security Team.

<http://10.200.17.11/4.2-4/#1945788768383152096>
Comment 2 Arvid Requate univentionstaff 2018-09-04 20:31:21 CEST
The upstream package has been copied. No UCS specific patches.

The piuparts result and advisory look ok.
Comment 3 Arvid Requate univentionstaff 2018-09-05 13:17:22 CEST
<http://errata.software-univention.de/ucs/4.2/506.html>