A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.12.4-0nocelt2ubuntu1.6", "binary_name": "libspice-server-dev" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.6", "binary_name": "libspice-server1" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.6", "binary_name": "libspice-server1-dbgsym" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.6", "binary_name": "spice-client" }, { "binary_version": "0.12.4-0nocelt2ubuntu1.6", "binary_name": "spice-client-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.14.0-1ubuntu2.1", "binary_name": "libspice-server-dev" }, { "binary_version": "0.14.0-1ubuntu2.1", "binary_name": "libspice-server1" }, { "binary_version": "0.14.0-1ubuntu2.1", "binary_name": "libspice-server1-dbgsym" } ] }