RedHat Update for libvirt RHSA-2012:1359-01. A flaw in libvirtd's RPC call handling could allow an attacker to crash the service. Update also fixes bugs related to libvirt.conf and block rebase operation
Reporter | Title | Published | Views | Family All 67 |
---|---|---|---|---|
![]() | CVE-2012-4423 | 19 Nov 201211:00 | – | cvelist |
![]() | CVE-2012-4423 | 19 Nov 201200:00 | – | ubuntucve |
![]() | RHEL 6 : libvirt (RHSA-2012:1359) | 12 Oct 201200:00 | – | nessus |
![]() | Fedora 17 : libvirt-0.9.11.6-1.fc17 (2012-15634) | 16 Oct 201200:00 | – | nessus |
![]() | Fedora 16 : libvirt-0.9.6.3-1.fc16 (2012-15640) | 17 Oct 201200:00 | – | nessus |
![]() | Oracle Linux 6 : libvirt (ELSA-2012-1359) | 12 Jul 201300:00 | – | nessus |
![]() | Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20121011) | 12 Oct 201200:00 | – | nessus |
![]() | CentOS 6 : libvirt (CESA-2012:1359) | 15 Oct 201200:00 | – | nessus |
![]() | openSUSE Security Update : libvirt (openSUSE-SU-2013:0274-1) | 13 Jun 201400:00 | – | nessus |
![]() | Ubuntu 12.04 LTS / 12.10 : libvirt vulnerabilities (USN-1708-1) | 30 Jan 201300:00 | – | nessus |
Source | Link |
---|---|
redhat | www.redhat.com/archives/rhsa-announce/2012-October/msg00013.html |
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for libvirt RHSA-2012:1359-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remote management of virtualized
systems.
A flaw was found in libvirtd's RPC call handling. An attacker able to
establish a read-only connection to libvirtd could use this flaw to crash
libvirtd by sending an RPC message that has an event as the RPC number, or
an RPC number that falls into a gap in the RPC dispatch table.
(CVE-2012-4423)
This issue was discovered by Wenlong Huang of the Red Hat Virtualization QE
Team.
This update also fixes the following bugs:
* When the host_uuid option was present in the libvirtd.conf file, the
augeas libvirt lens was unable to parse the file. This bug has been fixed
and the augeas libvirt lens now parses libvirtd.conf as expected in the
described scenario. (BZ#858988)
* When a virtual machine was started with an image chain using block
devices and a block rebase operation was issued, the operation failed on
completion in the blockJobAbort() function. This update relabels and
configures cgroups for the backing files and the rebase operation now
succeeds. (BZ#860720)
All users of libvirt are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, libvirtd will be restarted automatically.";
tag_affected = "libvirt on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "https://www.redhat.com/archives/rhsa-announce/2012-October/msg00013.html");
script_id(870845);
script_version("$Revision: 8265 $");
script_tag(name:"last_modification", value:"$Date: 2018-01-01 07:29:23 +0100 (Mon, 01 Jan 2018) $");
script_tag(name:"creation_date", value:"2012-10-12 09:19:43 +0530 (Fri, 12 Oct 2012)");
script_cve_id("CVE-2012-4423");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_xref(name: "RHSA", value: "2012:1359-01");
script_name("RedHat Update for libvirt RHSA-2012:1359-01");
script_tag(name: "summary" , value: "Check for the Version of libvirt");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"libvirt", rpm:"libvirt~0.9.10~21.el6_3.5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libvirt-client", rpm:"libvirt-client~0.9.10~21.el6_3.5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libvirt-debuginfo", rpm:"libvirt-debuginfo~0.9.10~21.el6_3.5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libvirt-devel", rpm:"libvirt-devel~0.9.10~21.el6_3.5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libvirt-python", rpm:"libvirt-python~0.9.10~21.el6_3.5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo