Home page logo

oss-sec logo oss-sec mailing list archives

CVE Request -- spice: unsafe clients ring access abort
From: Petr Matousek <pmatouse () redhat com>
Date: Tue, 16 Jul 2013 01:25:13 +0200

Currently, both red_channel_pipes_add_type() and
red_channel_pipes_add_empty_msg() use plaing RING_FOREACH() which is not
safe versus removals from the ring within the loop body. Yet, when
(network) error does occur, the current item could be removed from the
ring down the road and the assertion in RING_FOREACH()'s ring_next()
could trip, causing the process containing the spice server to abort.

An user able to initiate spice connection to the guest could use this
flaw to crash the guest.

Upstream fix:


Petr Matousek / Red Hat Security Response Team

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]