CVE-2013-4130
Published: 15 July 2013
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
Priority
Status
Package | Release | Status |
---|---|---|
spice Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Released
(0.12.2-0nocelt2expubuntu1.1)
|
|
saucy |
Released
(0.12.4-0nocelt1)
|
|
trusty |
Released
(0.12.4-0nocelt1)
|
|
upstream |
Released
(0.12.4-0nocelt1)
|
|
utopic |
Released
(0.12.4-0nocelt1)
|
|
vivid |
Released
(0.12.4-0nocelt1)
|
|
wily |
Released
(0.12.4-0nocelt1)
|
|
xenial |
Released
(0.12.4-0nocelt1)
|
|
yakkety |
Released
(0.12.4-0nocelt1)
|
|
zesty |
Released
(0.12.4-0nocelt1)
|
|
Patches: upstream: http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d |