Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system.
Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
For Debian 8 jessie, these problems have been fixed in version 0.25-1+deb8u2.
We recommend that you upgrade your spice-gtk packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/