First published: Mon Jul 15 2013(Updated: )
Currently, both red_channel_pipes_add_type() and red_channel_pipes_add_empty_msg() use plaing RING_FOREACH() which is not safe versus removals from the ring within the loop body. Yet, when (network) error does occur, the current item could be removed from the ring down the road and the assertion in RING_FOREACH()'s ring_next() could trip, causing the process containing the spice server to abort. An user able to initiate spice connection to the guest could use this flaw to crash the guest. Upstream fix: <a href="http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d">http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d</a> Acknowledgements: This issue was discovered by David Gibson of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SPICE | <=0.12.3 | |
SPICE | =0.5.2 | |
SPICE | =0.5.3 | |
SPICE | =0.6.0 | |
SPICE | =0.6.1 | |
SPICE | =0.6.2 | |
SPICE | =0.6.3 | |
SPICE | =0.6.4 | |
SPICE | =0.7.0 | |
SPICE | =0.7.1 | |
SPICE | =0.7.2 | |
SPICE | =0.7.3 | |
SPICE | =0.8.0 | |
SPICE | =0.8.1 | |
SPICE | =0.8.2 | |
SPICE | =0.8.3 | |
SPICE | =0.9.0 | |
SPICE | =0.9.1 | |
SPICE | =0.10.0 | |
SPICE | =0.10.1 | |
SPICE | =0.11.0 | |
SPICE | =0.11.3 | |
SPICE | =0.12.0 | |
SPICE | =0.12.2 | |
Ubuntu | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4130 is considered a moderate severity vulnerability due to potential exploitation in the red channel pipe handling.
To fix CVE-2013-4130, upgrade to the latest version of SPICE that is not affected, which is above 0.12.3.
CVE-2013-4130 affects SPICE versions from 0.5.2 up to and including 0.12.3.
The impact of CVE-2013-4130 includes possible network errors that could lead to an unsafe removal of items from the processing ring.
There are limited workarounds for CVE-2013-4130; the recommended approach is to apply the available security updates.