Mageia Bugzilla – Bug 12266
spice new security issue CVE-2013-4282
Last modified: 2014-01-21 17:44:04 CET
RedHat has issued an advisory on October 29:
Patch added in Mageia 3 and Cauldron SVN. Freeze push requested for Cauldron.
More details on this issue are here:
Steps to Reproduce:
Patched packages uploaded for Mageia 3 and Cauldron.
Updated spice packages fix security vulnerability:
A stack-based buffer overflow flaw was found in the way the
reds_handle_ticket() function in the spice-server library handled
decryption of ticket data provided by the client. A remote user able to
initiate a SPICE connection to an application acting as a SPICE server
could use this flaw to crash the application (CVE-2013-4282).
Updated packages in core/updates_testing:
It's not clear how to setup a SPICE service that the client can connect to. The documentation in the spice-client package is almost entirely non-existent. I did spice-client --host localhost and was asked for a port. The wikipedia page on the SPICE protocol does not provide a lot of info.
Are the spice package in question provided for people who are intimately familiar with them? What should be done?
The feedback tag is when feedback is needed from packagers. I don't know how to test this, but maybe you can search for previous times we've updated this in Bugzilla and can find some details there.
Testing complete mga3 64
Procedure in bug 10987
Testing complete mga3 32
Advisory uploaded. Validating.
Could sysadmin please push from 3 core/updates_testing to updates