First published: Mon Dec 05 2016(Updated: )
A buffer overflow vulnerability in main_channel_alloc_msg_rcv_buf was found that occurs when reading large messages due to missing buffer size check. Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1401038">https://bugzilla.redhat.com/show_bug.cgi?id=1401038</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/spice | 0.14.0-1.3+deb10u1 0.14.3-2.1 0.15.1-1 | |
debian/spice | <=0.12.5-1<=0.12.8-2 | 0.12.5-1+deb8u4 0.12.8-2.1 |
redhat/spice | <0.13.90 | 0.13.90 |
Spice Project Spice | <0.13.90 | |
Debian Debian Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.