CVE-2017-7506

NameCVE-2017-7506
Descriptionspice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3907-1
Debian Bugs868083

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spice (PTS)buster, buster (security)0.14.0-1.3+deb10u1fixed
bullseye0.14.3-2.1fixed
sid, trixie, bookworm0.15.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spicesourcewheezy(not affected)
spicesourcejessie0.12.5-1+deb8u5DSA-3907-1
spicesourcestretch0.12.8-2.1+deb9u1DSA-3907-1
spicesource(unstable)0.12.8-2.2868083

Notes

[wheezy] - spice <not-affected> (Vulnerable code not introduced later)

Search for package or bug name: Reporting problems