Important CentOS spice-gtk Update

Metadata

medium
4.6
spice-glib-0.14-7.el6_4.3.i686.rpm, spice-glib-0.14-7.el6_4.3.x86_64.rpm, spice-glib-devel-0.14-7.el6_4.3.i686.rpm, spice-glib-devel-0.14-7.el6_4.3.x86_64.rpm, spice-gtk-0.14-7.el6_4.3.i686.rpm, spice-gtk-0.14-7.el6_4.3.src.rpm, spice-gtk-0.14-7.el6_4.3.x86_64.rpm, spice-gtk-devel-0.14-7.el6_4.3.i686.rpm, spice-gtk-devel-0.14-7.el6_4.3.x86_64.rpm, spice-gtk-python-0.14-7.el6_4.3.i686.rpm, spice-gtk-python-0.14-7.el6_4.3.x86_64.rpm, spice-gtk-tools-0.14-7.el6_4.3.i686.rpm, spice-gtk-tools-0.14-7.el6_4.3.x86_64.rpm
CVE-2013-4324
rhn.redhat.com, lists.centos.org
2013-09-20
2017-07-27 19:06
CVE-2013-4324 spice-gtk
CVE-2013-4324
2017-04-01 19:07
2017-01-05 20:11

Description


Updated spice-gtk packages that fix one security issue are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for SPICE
(Simple Protocol for Independent Computing Environments) clients. Both
Virtual Machine Manager and Virtual Machine Viewer can make use of this
widget to access virtual machines using the SPICE protocol.

spice-gtk communicated with PolicyKit for authorization via an API that is
vulnerable to a race condition. This could lead to intended PolicyKit
authorizations being bypassed. This update modifies spice-gtk to
communicate with PolicyKit via a different API that is not vulnerable to
the race condition. (CVE-2013-4324)

All users of spice-gtk are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 spice-glib spice-glib-0.14-7.el6_4.3.i686.rpm
spice-glib spice-glib-0.14-7.el6_4.3.x86_64.rpm
spice-glib-devel spice-glib-devel-0.14-7.el6_4.3.i686.rpm
spice-glib-devel spice-glib-devel-0.14-7.el6_4.3.x86_64.rpm
spice-gtk spice-gtk-0.14-7.el6_4.3.i686.rpm
spice-gtk spice-gtk-0.14-7.el6_4.3.src.rpm
spice-gtk spice-gtk-0.14-7.el6_4.3.x86_64.rpm
spice-gtk-devel spice-gtk-devel-0.14-7.el6_4.3.i686.rpm
spice-gtk-devel spice-gtk-devel-0.14-7.el6_4.3.x86_64.rpm
spice-gtk-python spice-gtk-python-0.14-7.el6_4.3.i686.rpm
spice-gtk-python spice-gtk-python-0.14-7.el6_4.3.x86_64.rpm
spice-gtk-tools spice-gtk-tools-0.14-7.el6_4.3.i686.rpm
spice-gtk-tools spice-gtk-tools-0.14-7.el6_4.3.x86_64.rpm