First published: Thu Oct 12 2017(Updated: )
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/spice | <0.12.8-2.2ubuntu0.1 | 0.12.8-2.2ubuntu0.1 |
ubuntu/spice | <0.14.0-1ubuntu2.1 | 0.14.0-1ubuntu2.1 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.12.4-0 | 0.12.4-0 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice | <0.14.0-1ubuntu3 | 0.14.0-1ubuntu3 |
ubuntu/spice-gtk | <0.35-1 | 0.35-1 |
ubuntu/spice-protocol | <0.12.10-1ubuntu0.1 | 0.12.10-1ubuntu0.1 |
<=0.34 | ||
Spice-gtk Project Spice-gtk | <=0.34 | |
debian/spice-gtk | 0.35-2 0.39-1 0.42-1 0.42-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.