CVE-2013-6631
Published: 19 November 2013
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(31.0.1650.63-0ubuntu0.12.04.1~20131204.1)
|
|
quantal |
Released
(31.0.1650.63-0ubuntu0.12.10.1~20131204.1)
|
|
raring |
Released
(31.0.1650.63-0ubuntu0.13.04.1~20131204.1)
|
|
saucy |
Released
(31.0.1650.63-0ubuntu0.13.10.1~20131204.1)
|
|
upstream |
Released
(31.0.1650.48)
|
References
- https://webrtc-codereview.appspot.com/2275008
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://code.google.com/p/chromium/issues/detail?id=296804
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- https://www.cve.org/CVERecord?id=CVE-2013-6631
- NVD
- Launchpad
- Debian