A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
{ "binaries": [ { "binary_name": "libspice-server-dev", "binary_version": "0.12.4-0nocelt2ubuntu1.4" }, { "binary_name": "libspice-server1", "binary_version": "0.12.4-0nocelt2ubuntu1.4" }, { "binary_name": "libspice-server1-dbgsym", "binary_version": "0.12.4-0nocelt2ubuntu1.4" }, { "binary_name": "spice-client", "binary_version": "0.12.4-0nocelt2ubuntu1.4" }, { "binary_name": "spice-client-dbgsym", "binary_version": "0.12.4-0nocelt2ubuntu1.4" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }
{ "binaries": [ { "binary_name": "libspice-server-dev", "binary_version": "0.12.6-4ubuntu0.2" }, { "binary_name": "libspice-server-dev-dbgsym", "binary_version": "0.12.6-4ubuntu0.2" }, { "binary_name": "libspice-server1", "binary_version": "0.12.6-4ubuntu0.2" }, { "binary_name": "libspice-server1-dbg", "binary_version": "0.12.6-4ubuntu0.2" }, { "binary_name": "libspice-server1-dbgsym", "binary_version": "0.12.6-4ubuntu0.2" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }