Moderate CentOS spice-gtk Update

Metadata

medium
6.9
spice-glib-0.11-11.el6_3.1.i686.rpm, spice-glib-0.11-11.el6_3.1.x86_64.rpm, spice-glib-devel-0.11-11.el6_3.1.i686.rpm, spice-glib-devel-0.11-11.el6_3.1.x86_64.rpm, spice-gtk-0.11-11.el6_3.1.i686.rpm, spice-gtk-0.11-11.el6_3.1.src.rpm, spice-gtk-0.11-11.el6_3.1.x86_64.rpm, spice-gtk-devel-0.11-11.el6_3.1.i686.rpm, spice-gtk-devel-0.11-11.el6_3.1.x86_64.rpm, spice-gtk-python-0.11-11.el6_3.1.i686.rpm, spice-gtk-python-0.11-11.el6_3.1.x86_64.rpm, spice-gtk-tools-0.11-11.el6_3.1.i686.rpm, spice-gtk-tools-0.11-11.el6_3.1.x86_64.rpm
CVE-2012-4425
rhn.redhat.com, lists.centos.org
2012-09-17
2017-07-27 19:04
CVE-2012-4425 spice-gtk
CVE-2012-4425
2017-04-01 19:06
2017-01-05 20:10

Description


Updated spice-gtk packages that fix one security issue are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for SPICE
(Simple Protocol for Independent Computing Environments) clients. Both
Virtual Machine Manager and Virtual Machine Viewer can make use of this
widget to access virtual machines using the SPICE protocol.

It was discovered that the spice-gtk setuid helper application,
spice-client-glib-usb-acl-helper, did not clear the environment variables
read by the libraries it uses. A local attacker could possibly use this
flaw to escalate their privileges by setting specific environment variables
before running the helper application. (CVE-2012-4425)

Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for
reporting this issue.

All users of spice-gtk are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 spice-glib spice-glib-0.11-11.el6_3.1.i686.rpm
spice-glib spice-glib-0.11-11.el6_3.1.x86_64.rpm
spice-glib-devel spice-glib-devel-0.11-11.el6_3.1.i686.rpm
spice-glib-devel spice-glib-devel-0.11-11.el6_3.1.x86_64.rpm
spice-gtk spice-gtk-0.11-11.el6_3.1.i686.rpm
spice-gtk spice-gtk-0.11-11.el6_3.1.src.rpm
spice-gtk spice-gtk-0.11-11.el6_3.1.x86_64.rpm
spice-gtk-devel spice-gtk-devel-0.11-11.el6_3.1.i686.rpm
spice-gtk-devel spice-gtk-devel-0.11-11.el6_3.1.x86_64.rpm
spice-gtk-python spice-gtk-python-0.11-11.el6_3.1.i686.rpm
spice-gtk-python spice-gtk-python-0.11-11.el6_3.1.x86_64.rpm
spice-gtk-tools spice-gtk-tools-0.11-11.el6_3.1.i686.rpm
spice-gtk-tools spice-gtk-tools-0.11-11.el6_3.1.x86_64.rpm