Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2013-4130

Published: 15 July 2013

The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.

Priority

Medium

Status

Package Release Status
spice
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist
(precise was needed)
quantal Ignored
(reached end-of-life)
raring
Released (0.12.2-0nocelt2expubuntu1.1)
saucy
Released (0.12.4-0nocelt1)
trusty
Released (0.12.4-0nocelt1)
upstream
Released (0.12.4-0nocelt1)
utopic
Released (0.12.4-0nocelt1)
vivid
Released (0.12.4-0nocelt1)
wily
Released (0.12.4-0nocelt1)
xenial
Released (0.12.4-0nocelt1)
yakkety
Released (0.12.4-0nocelt1)
zesty
Released (0.12.4-0nocelt1)
Patches:
upstream: http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d