Subject: | |
From: | |
Reply To: | |
Date: | Wed, 25 Aug 2010 15:36:33 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: spice-xpi security and bug fix update
Issue date: 2010-08-25
CVE Names: CVE-2010-2792 CVE-2010-2794
The spice-xpi package provides a plug-in that allows the SPICE client to
run from within Mozilla Firefox.
A race condition was found in the way the SPICE Firefox plug-in and the
SPICE client communicated. A local attacker could use this flaw to trick
the plug-in and the SPICE client into communicating over an
attacker-controlled socket, possibly gaining access to authentication
details, or resulting in a man-in-the-middle attack on the SPICE
connection. (CVE-2010-2792)
It was found that the SPICE Firefox plug-in used a predictable name for
its log file. A local attacker could use this flaw to conduct a symbolic
link attack, allowing them to overwrite arbitrary files accessible to
the user running Firefox. (CVE-2010-2794)
This update also fixes the following bugs:
* a bug prevented users of Red Hat Enterprise Linux 5.5, with all
updates applied, from running the SPICE Firefox plug-in when using
Firefox 3.6.4. With this update, the plug-in works correctly with
Firefox 3.6.4 and the latest version in Red Hat Enterprise Linux 5.5,
Firefox 3.6.7. (BZ#618244)
* unused code has been removed during source code refactoring. This also
resolves a bug in the SPICE Firefox plug-in that caused it to close
random file descriptors. (BZ#594006, BZ#619067)
Note: This update should be installed together with the qspice-client
security update.
After installing the update, Firefox must be restarted for the changes
to take effect.
SL 5.x
SRPMS:
spice-xpi-2.2-2.3.el5_5.src.rpm
i386:
spice-xpi-2.2-2.3.el5_5.i386.rpm
x86_64:
spice-xpi-2.2-2.3.el5_5.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|