{"id":"MGASA-2019-0100","summary":"Updated spice packages fix security vulnerability","details":"Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds\nread due to an off-by-one error in memslot_get_virt. This may lead to a\ndenial of service, or, in the worst case, code-execution by unauthenticated\nattackers. (CVE-2019-3813)\n\nA vulnerability was discovered in SPICE before version 0.14.1 where the\ngenerated code used for demarshalling messages lacked sufficient bounds\nchecks. A malicious client or server, after authentication, could send\nspecially crafted messages to its peer which would result in a crash or,\npotentially, other impacts. (CVE-2018-10873)\n\nMultiple integer overflow and buffer overflow issues were discovered in\nspice-client's handling of LZ compressed frames. A malicious server could\ncause the client to crash or, potentially, execute arbitrary code.\n(CVE-2018-10893)\n","modified":"2026-02-04T02:39:13.185509Z","published":"2019-02-22T00:35:50Z","related":["CVE-2018-10873","CVE-2018-10893","CVE-2019-3813"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0100.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=24257"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2019/01/28/2"},{"type":"REPORT","url":"https://access.redhat.com/errata/RHSA-2019:0231"},{"type":"REPORT","url":"https://usn.ubuntu.com/3870-1/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/OWH2AHGKTPR5QUGXUYGY6CAEI3O7RPLL/"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2018/08/17/1"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2018-09/msg00007.html"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2018-09/msg00010.html"}],"affected":[{"package":{"name":"spice","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/spice?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.13.90-1.2.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0100.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}