ALT-PU-2014-1262-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-6436
The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
- http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f8c1cb90213508c4f32549023b0572ed774e48aa
- http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f8c1cb90213508c4f32549023b0572ed774e48aa
- openSUSE-SU-2014:0010
- openSUSE-SU-2014:0010
- 101485
- 101485
- 56245
- 56245
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- USN-2093-1
- USN-2093-1
- [libvirt] 20131220 SECURITY: CVE-2013-6436: libvirtd daemon crash when reading memory tunables for LXC guest in shutoff status
- [libvirt] 20131220 SECURITY: CVE-2013-6436: libvirtd daemon crash when reading memory tunables for LXC guest in shutoff status
Modified: 2024-11-21
CVE-2013-6456
The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
- http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4
- http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4
- http://libvirt.org/news.html
- http://libvirt.org/news.html
- FEDORA-2014-2864
- FEDORA-2014-2864
- openSUSE-SU-2014:0593
- openSUSE-SU-2014:0593
- 56187
- 56187
- 56215
- 56215
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- http://security.libvirt.org/2013/0018.html
- http://security.libvirt.org/2013/0018.html
- 65743
- 65743
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394
- https://bugzilla.redhat.com/show_bug.cgi?id=1045643
- https://bugzilla.redhat.com/show_bug.cgi?id=1045643
Modified: 2024-11-21
CVE-2013-6457
The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.
- http://libvirt.org/news.html
- http://libvirt.org/news.html
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0268
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- USN-2093-1
- USN-2093-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1048629
- https://bugzilla.redhat.com/show_bug.cgi?id=1048629
- [libvirt] 20131220 [PATCH] libxl: avoid crashing if calling `virsh numatune' on inactive domain
- [libvirt] 20131220 [PATCH] libxl: avoid crashing if calling `virsh numatune' on inactive domain
- [libvirt] 20131224 CVE-2013-6457 Re: [PATCH] libxl: avoid crashing if calling `virsh numatune' on inactive domain
- [libvirt] 20131224 CVE-2013-6457 Re: [PATCH] libxl: avoid crashing if calling `virsh numatune' on inactive domain
Modified: 2024-11-21
CVE-2013-6458
Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
- http://libvirt.org/news.html
- http://libvirt.org/news.html
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0270
- openSUSE-SU-2014:0270
- RHSA-2014:0103
- RHSA-2014:0103
- 56186
- 56186
- 56446
- 56446
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- DSA-2846
- DSA-2846
- USN-2093-1
- USN-2093-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1043069
- https://bugzilla.redhat.com/show_bug.cgi?id=1043069
Modified: 2024-11-21
CVE-2014-0028
libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
- http://libvirt.org/news.html
- http://libvirt.org/news.html
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0268
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- USN-2093-1
- USN-2093-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1048637
- https://bugzilla.redhat.com/show_bug.cgi?id=1048637
- [libvirt] 20140115 [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering
- [libvirt] 20140115 [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering
Modified: 2024-11-21
CVE-2014-1447
Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
- http://libvirt.org/news.html
- http://libvirt.org/news.html
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0268
- openSUSE-SU-2014:0270
- openSUSE-SU-2014:0270
- RHSA-2014:0103
- RHSA-2014:0103
- 56321
- 56321
- 56446
- 56446
- 60895
- 60895
- GLSA-201412-04
- GLSA-201412-04
- DSA-2846
- DSA-2846
- 1029695
- 1029695
- USN-2093-1
- USN-2093-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1047577
- https://bugzilla.redhat.com/show_bug.cgi?id=1047577