USN-3751-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3751-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-3751-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3751-1
Related
Published
2018-08-22T17:43:13.087244Z
Modified
2018-08-22T17:43:13.087244Z
Summary
spice, spice-protocol vulnerability
Details

It was discovered that Spice incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service.

References

Affected packages

Ubuntu:14.04:LTS / spice

Package

Name
spice

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.12.4-0nocelt2ubuntu1.7

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "spice-client": "0.12.4-0nocelt2ubuntu1.7",
            "libspice-server1": "0.12.4-0nocelt2ubuntu1.7",
            "libspice-server-dev": "0.12.4-0nocelt2ubuntu1.7"
        }
    ]
}

Ubuntu:18.04:LTS / spice

Package

Name
spice

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.0-1ubuntu2.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libspice-server1": "0.14.0-1ubuntu2.2",
            "libspice-server-dev": "0.14.0-1ubuntu2.2"
        }
    ]
}

Ubuntu:16.04:LTS / spice-protocol

Package

Name
spice-protocol

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.12.10-1ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libspice-protocol-dev": "0.12.10-1ubuntu0.2"
        }
    ]
}