A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
{
"binaries": [
{
"binary_version": "0.12.4-0nocelt2ubuntu1.6",
"binary_name": "libspice-server-dev"
},
{
"binary_version": "0.12.4-0nocelt2ubuntu1.6",
"binary_name": "libspice-server1"
},
{
"binary_version": "0.12.4-0nocelt2ubuntu1.6",
"binary_name": "spice-client"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "0.34-1.1build1",
"binary_name": "gir1.2-spiceclientglib-2.0"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "gir1.2-spiceclientgtk-3.0"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "libspice-client-glib-2.0-8"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "libspice-client-glib-2.0-dev"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "libspice-client-gtk-3.0-5"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "libspice-client-gtk-3.0-dev"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "spice-client-glib-usb-acl-helper"
},
{
"binary_version": "0.34-1.1build1",
"binary_name": "spice-client-gtk"
}
]
}