A vulnerability has been found in the Simple Protocol for Independent Computing
Environments, SPICE.
Frediano Ziglio from Red Hat discovered that SPICE allowed local guest
OS users to read from or write to arbitrary host memory locations via
crafted primary surface parameters.
For Debian 7 Wheezy, this problem has been fixed in version 0.11.0-1+deb7u3.
We recommend you to upgrade your spice packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS>
CPE | Name | Operator | Version |
---|---|---|---|
spice | eq | 0.11.0-1+deb7u2 | |
spice | eq | 0.11.0-1+deb7u1 | |
spice | eq | 0.11.0-1 |