CVE-2013-4130

Publication date 15 July 2013

Last updated 24 July 2024


Ubuntu priority

The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.

Status

Package Ubuntu Release Status
spice 17.04 zesty
Fixed 0.12.4-0nocelt1
16.10 yakkety
Fixed 0.12.4-0nocelt1
16.04 LTS xenial
Fixed 0.12.4-0nocelt1
15.10 wily
Fixed 0.12.4-0nocelt1
15.04 vivid
Fixed 0.12.4-0nocelt1
14.10 utopic
Fixed 0.12.4-0nocelt1
14.04 LTS trusty
Fixed 0.12.4-0nocelt1
13.10 saucy
Fixed 0.12.4-0nocelt1
13.04 raring
Fixed 0.12.2-0nocelt2expubuntu1.1
12.10 quantal Ignored end of life
12.04 LTS precise Ignored end of life
10.04 LTS lucid Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
spice

References

Related Ubuntu Security Notices (USN)

Other references