spice (0.12.6-4ubuntu0.3) xenial-security; urgency=medium
* SECURITY UPDATE: buffer overflow via invalid monitor configurations
- debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
overly big ClientMonitorsConfig in server/reds.c.
- debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
handling monitor configuration in server/reds.c.
- debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
monitor configuration in server/reds.c.
- CVE-2017-7506
Date: 2017-07-18 18:51:14.861306+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/spice/0.12.6-4ubuntu0.3
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes