LWN.net Logo

spice: denial of service

Package(s):spice CVE #(s):CVE-2013-4130
Created:August 12, 2013 Updated:September 4, 2013
Description: From the Red Hat bugzilla:

Currently, both red_channel_pipes_add_type() and red_channel_pipes_add_empty_msg() use plaing RING_FOREACH() which is not safe versus removals from the ring within the loop body. Yet, when (network) error does occur, the current item could be removed from the ring down the road and the assertion in RING_FOREACH()'s ring_next() could trip, causing the process containing the spice server to abort.

An user able to initiate spice connection to the guest could use this flaw to crash the guest.

Alerts:
Fedora FEDORA-2013-14110 2013-08-10
Ubuntu USN-1926-1 2013-08-14
Fedora FEDORA-2013-14362 2013-08-15
Mageia MGASA-2013-0255 2013-08-22
Mandriva MDVSA-2013:217 2013-08-23
Red Hat RHSA-2013:1192-01 2013-09-03
CentOS CESA-2013:1192 2013-09-03
Oracle ELSA-2013-1192 2013-09-03
Scientific Linux SLSA-2013:1192-1 2013-09-04

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds