A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.12.4-0nocelt2ubuntu1.4", "binary_name": "libspice-server-dev" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.4", "binary_name": "libspice-server1" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.4", "binary_name": "libspice-server1-dbgsym" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.4", "binary_name": "spice-client" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.4", "binary_name": "spice-client-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.12.6-4ubuntu0.2", "binary_name": "libspice-server-dev" }, { "binary_version": "0.12.6-4ubuntu0.2", "binary_name": "libspice-server-dev-dbgsym" }, { "binary_version": "0.12.6-4ubuntu0.2", "binary_name": "libspice-server1" }, { "binary_version": "0.12.6-4ubuntu0.2", "binary_name": "libspice-server1-dbg" }, { "binary_version": "0.12.6-4ubuntu0.2", "binary_name": "libspice-server1-dbgsym" } ] }