CVE-2013-4130
Publication date 15 July 2013
Last updated 24 July 2024
Ubuntu priority
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
Status
Package | Ubuntu Release | Status |
---|---|---|
spice | ||
16.04 LTS xenial |
Fixed 0.12.4-0nocelt1
|
|
14.04 LTS trusty |
Fixed 0.12.4-0nocelt1
|
|
References
Related Ubuntu Security Notices (USN)
- USN-1926-1
- SPICE vulnerability
- 14 August 2013