Sender: |
|
Date: |
Wed, 25 Aug 2010 15:36:33 -0500 |
MIME-version: |
1.0 |
Reply-To: |
|
Content-type: |
text/plain; format=flowed; charset=ISO-8859-1 |
Subject: |
|
From: |
|
Content-transfer-encoding: |
7BIT |
Comments: |
|
Parts/Attachments: |
|
|
Synopsis: Moderate: spice-xpi security and bug fix update
Issue date: 2010-08-25
CVE Names: CVE-2010-2792 CVE-2010-2794
The spice-xpi package provides a plug-in that allows the SPICE client to
run from within Mozilla Firefox.
A race condition was found in the way the SPICE Firefox plug-in and the
SPICE client communicated. A local attacker could use this flaw to trick
the plug-in and the SPICE client into communicating over an
attacker-controlled socket, possibly gaining access to authentication
details, or resulting in a man-in-the-middle attack on the SPICE
connection. (CVE-2010-2792)
It was found that the SPICE Firefox plug-in used a predictable name for
its log file. A local attacker could use this flaw to conduct a symbolic
link attack, allowing them to overwrite arbitrary files accessible to
the user running Firefox. (CVE-2010-2794)
This update also fixes the following bugs:
* a bug prevented users of Red Hat Enterprise Linux 5.5, with all
updates applied, from running the SPICE Firefox plug-in when using
Firefox 3.6.4. With this update, the plug-in works correctly with
Firefox 3.6.4 and the latest version in Red Hat Enterprise Linux 5.5,
Firefox 3.6.7. (BZ#618244)
* unused code has been removed during source code refactoring. This also
resolves a bug in the SPICE Firefox plug-in that caused it to close
random file descriptors. (BZ#594006, BZ#619067)
Note: This update should be installed together with the qspice-client
security update.
After installing the update, Firefox must be restarted for the changes
to take effect.
SL 5.x
SRPMS:
spice-xpi-2.2-2.3.el5_5.src.rpm
i386:
spice-xpi-2.2-2.3.el5_5.i386.rpm
x86_64:
spice-xpi-2.2-2.3.el5_5.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|