Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2011-2511
Vulnerability from cvelistv5
Published
2011-08-10 20:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:34.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://libvirt.org/news.html" }, { "name": "libvirt-virdomaingetvcpus-bo(68271)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "name": "45441", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45441" }, { "name": "FEDORA-2011-9091", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "name": "45446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45446" }, { "name": "[oss-security] 20110628 CVE request: libvirt: integer overflow in VirDomainGetVcpus", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "name": "RHSA-2011:1197", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "name": "RHSA-2011:1019", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "name": "USN-1180-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "name": "45375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45375" }, { "name": "[libvirt] 20110624 [PATCH 2/2] remote: protect against integer overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" }, { "name": "1025822", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025822" }, { "name": "DSA-2280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2280" }, { "name": "SUSE-SU-2011:0837", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/10027908" }, { "name": "FEDORA-2011-9062", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://libvirt.org/news.html" }, { "name": "libvirt-virdomaingetvcpus-bo(68271)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "name": "45441", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45441" }, { "name": "FEDORA-2011-9091", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "name": "45446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45446" }, { "name": "[oss-security] 20110628 CVE request: libvirt: integer overflow in VirDomainGetVcpus", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "name": "RHSA-2011:1197", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "name": "RHSA-2011:1019", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "name": "USN-1180-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "name": "45375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45375" }, { "name": "[libvirt] 20110624 [PATCH 2/2] remote: protect against integer overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" }, { "name": "1025822", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025822" }, { "name": "DSA-2280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2280" }, { "name": "SUSE-SU-2011:0837", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/10027908" }, { "name": "FEDORA-2011-9062", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2511", "datePublished": "2011-08-10T20:00:00", "dateReserved": "2011-06-15T00:00:00", "dateUpdated": "2024-08-06T23:00:34.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.9.2\", \"matchCriteriaId\": \"AEB82706-26C4-48C5-8918-EBFD96411440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AFF5EF5-280A-499B-BD63-361EDC49A923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE616C79-74E0-4876-83D7-BE04CB954F92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87FF4782-A017-4D6F-9588-BE0AD4AA04E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF62226E-E4FE-4AF5-86A2-344148158A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C540F8A3-E12A-403B-81D2-CDB28DE03E47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0900588-EBF9-4459-B1D7-588B72E40689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE650A9D-D12D-43C5-B276-B3116CF096F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"359F1970-822B-4430-86EB-15091B2B4338\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08DB661-40DF-4234-9F6B-2EE0746FAC8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E86D1293-6881-4F9D-B245-E16040921DF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C49F1101-0845-478F-BEA1-67185A763D37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA319732-E860-459E-9C20-ED31D90510DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06B16020-5330-4F99-8DD3-8B4037E22CFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BCA6D83-281F-4B28-9CB2-253614017B5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C97CB42C-C89F-4BE6-80AC-A020EBF369FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC2F2D6-90E3-4306-A29A-0A507BDF889C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB533B81-AFF3-442E-A499-555F2181F64D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53AD34A3-9097-4375-BB30-CAED13987396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E37E3B-18A8-4D34-9400-2C18D0DBAAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36EAE07C-284D-4BEB-ABDF-28C157B3B90B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28C5275-39D4-4C7C-A064-70161FE35802\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"643D7C4C-6BD9-49CE-A7FD-819300CA955C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77476F3F-A914-4EC6-9488-189BD9E1AE6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B22C7B3D-169D-45CC-B1C1-9864991B3E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D6D1F10-2908-42E0-8D8F-1FBBC804505D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"450BD95B-5CE1-49E7-B6DB-6C14D9115CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"508578FC-BDC7-4B44-9F98-BD6CD657F57B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD25F37B-C666-4EDB-AD77-CCE04A800348\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8903EA9-D354-4C9E-B308-653689534AFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F811BE37-6F53-4663-819F-E954787C345B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2886A659-24BD-483B-8FCD-5BC21573EE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65FD148D-0088-47D5-AAC1-E0E990F9D170\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84613074-CFA0-4C0B-B896-0751F652EA71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BCCF73F-8542-4955-ACD6-44F199D49CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05C7EF0F-C069-424A-9B3F-D07C72450ADA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F25DF6A-34D5-4D5B-AFAF-7A21202460EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B67C29ED-2975-47F0-AE75-875A380ECC56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC90B806-1FB3-434E-A664-2842AD3BA9CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0054B43A-F844-47C8-B03A-01696117B7E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5C78A50-0F41-405C-9ABA-EE088D0ABE60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8322F4E2-0AD0-497B-871E-233C0E0F1490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E41CEF32-4998-41D5-B971-12E7F4E39FB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E43FD74C-5986-4E9E-9C4F-9891133084A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFD9B43-52BA-4FF9-84A1-369B1A96A166\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10EE76EF-44D3-4645-B1E7-5BCFB4CB4204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"934215BC-33D1-453F-B49B-23B52E580214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F274792B-F190-4A23-A551-6B07EA4028B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2059834-5A26-4DB9-B400-DBBE15690AAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F6277D-6732-44BA-91B4-D57877E011BD\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de entero en libvirt anterior a v0.9.3 permite a usuarios autenticados remotamente provocar una denegaci\\u00f3n de servicio (ca\\u00edda libvirtd) y posiblemente ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de una llamada manipulada VirDomainGetVcpus RPC que provoca corrupci\\u00f3n de memoria.\"}]", "id": "CVE-2011-2511", "lastModified": "2024-11-21T01:28:26.073", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:P\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-08-10T20:55:01.547", "references": "[{\"url\": \"http://libvirt.org/news.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/45375\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45441\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45446\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2280\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/06/28/9\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1019.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1197.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025822\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1180-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68271\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://hermes.opensuse.org/messages/10027908\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://libvirt.org/news.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45375\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45441\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45446\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2280\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/06/28/9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1197.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025822\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1180-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68271\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://hermes.opensuse.org/messages/10027908\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-2511\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-08-10T20:55:01.547\",\"lastModified\":\"2024-11-21T01:28:26.073\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de entero en libvirt anterior a v0.9.3 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda libvirtd) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada manipulada VirDomainGetVcpus RPC que provoca corrupci\u00f3n de memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.2\",\"matchCriteriaId\":\"AEB82706-26C4-48C5-8918-EBFD96411440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AFF5EF5-280A-499B-BD63-361EDC49A923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE616C79-74E0-4876-83D7-BE04CB954F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87FF4782-A017-4D6F-9588-BE0AD4AA04E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF62226E-E4FE-4AF5-86A2-344148158A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C540F8A3-E12A-403B-81D2-CDB28DE03E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0900588-EBF9-4459-B1D7-588B72E40689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE650A9D-D12D-43C5-B276-B3116CF096F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359F1970-822B-4430-86EB-15091B2B4338\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08DB661-40DF-4234-9F6B-2EE0746FAC8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86D1293-6881-4F9D-B245-E16040921DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49F1101-0845-478F-BEA1-67185A763D37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA319732-E860-459E-9C20-ED31D90510DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B16020-5330-4F99-8DD3-8B4037E22CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BCA6D83-281F-4B28-9CB2-253614017B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97CB42C-C89F-4BE6-80AC-A020EBF369FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2F2D6-90E3-4306-A29A-0A507BDF889C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB533B81-AFF3-442E-A499-555F2181F64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AD34A3-9097-4375-BB30-CAED13987396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E37E3B-18A8-4D34-9400-2C18D0DBAAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36EAE07C-284D-4BEB-ABDF-28C157B3B90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28C5275-39D4-4C7C-A064-70161FE35802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643D7C4C-6BD9-49CE-A7FD-819300CA955C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77476F3F-A914-4EC6-9488-189BD9E1AE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B22C7B3D-169D-45CC-B1C1-9864991B3E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6D1F10-2908-42E0-8D8F-1FBBC804505D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450BD95B-5CE1-49E7-B6DB-6C14D9115CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"508578FC-BDC7-4B44-9F98-BD6CD657F57B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD25F37B-C666-4EDB-AD77-CCE04A800348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8903EA9-D354-4C9E-B308-653689534AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F811BE37-6F53-4663-819F-E954787C345B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2886A659-24BD-483B-8FCD-5BC21573EE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65FD148D-0088-47D5-AAC1-E0E990F9D170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84613074-CFA0-4C0B-B896-0751F652EA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BCCF73F-8542-4955-ACD6-44F199D49CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C7EF0F-C069-424A-9B3F-D07C72450ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F25DF6A-34D5-4D5B-AFAF-7A21202460EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67C29ED-2975-47F0-AE75-875A380ECC56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC90B806-1FB3-434E-A664-2842AD3BA9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0054B43A-F844-47C8-B03A-01696117B7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5C78A50-0F41-405C-9ABA-EE088D0ABE60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8322F4E2-0AD0-497B-871E-233C0E0F1490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E41CEF32-4998-41D5-B971-12E7F4E39FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43FD74C-5986-4E9E-9C4F-9891133084A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFD9B43-52BA-4FF9-84A1-369B1A96A166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10EE76EF-44D3-4645-B1E7-5BCFB4CB4204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934215BC-33D1-453F-B49B-23B52E580214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F274792B-F190-4A23-A551-6B07EA4028B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2059834-5A26-4DB9-B400-DBBE15690AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F6277D-6732-44BA-91B4-D57877E011BD\"}]}]}],\"references\":[{\"url\":\"http://libvirt.org/news.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/45375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45441\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2280\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/06/28/9\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1019.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1197.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1025822\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1180-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68271\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://hermes.opensuse.org/messages/10027908\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://libvirt.org/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2280\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/06/28/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1197.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1180-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68271\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://hermes.opensuse.org/messages/10027908\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}" } }
gsd-2011-2511
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-2511", "description": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "id": "GSD-2011-2511", "references": [ "https://www.suse.com/security/cve/CVE-2011-2511.html", "https://www.debian.org/security/2011/dsa-2280", "https://access.redhat.com/errata/RHSA-2011:1197", "https://access.redhat.com/errata/RHSA-2011:1019", "https://linux.oracle.com/cve/CVE-2011-2511.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-2511" ], "details": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "id": "GSD-2011-2511", "modified": "2023-12-13T01:19:07.309703Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://libvirt.org/news.html", "refsource": "MISC", "url": "http://libvirt.org/news.html" }, { "name": "http://www.debian.org/security/2011/dsa-2280", "refsource": "MISC", "url": "http://www.debian.org/security/2011/dsa-2280" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" }, { "name": "http://secunia.com/advisories/45375", "refsource": "MISC", "url": "http://secunia.com/advisories/45375" }, { "name": "http://secunia.com/advisories/45441", "refsource": "MISC", "url": "http://secunia.com/advisories/45441" }, { "name": "http://secunia.com/advisories/45446", "refsource": "MISC", "url": "http://secunia.com/advisories/45446" }, { "name": "http://www.openwall.com/lists/oss-security/2011/06/28/9", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-1019.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-1197.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "name": "http://www.securitytracker.com/id?1025822", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1025822" }, { "name": "http://www.ubuntu.com/usn/USN-1180-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "name": "https://hermes.opensuse.org/messages/10027908", "refsource": "MISC", "url": "https://hermes.opensuse.org/messages/10027908" }, { "name": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2511" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "45375", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45375" }, { "name": "[oss-security] 20110628 CVE request: libvirt: integer overflow in VirDomainGetVcpus", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "name": "SUSE-SU-2011:0837", "refsource": "SUSE", "tags": [], "url": "https://hermes.opensuse.org/messages/10027908" }, { "name": "DSA-2280", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2011/dsa-2280" }, { "name": "45446", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45446" }, { "name": "1025822", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1025822" }, { "name": "45441", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45441" }, { "name": "[libvirt] 20110624 [PATCH 2/2] remote: protect against integer overflow", "refsource": "MLIST", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" }, { "name": "RHSA-2011:1019", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "name": "USN-1180-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "name": "FEDORA-2011-9062", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" }, { "name": "http://libvirt.org/news.html", "refsource": "CONFIRM", "tags": [], "url": "http://libvirt.org/news.html" }, { "name": "FEDORA-2011-9091", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "name": "RHSA-2011:1197", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "name": "libvirt-virdomaingetvcpus-bo(68271)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:31Z", "publishedDate": "2011-08-10T20:55Z" } } }
rhsa-2011_1019
Vulnerability from csaf_redhat
Published
2011-07-21 09:23
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
Notes
Topic
Updated libvirt packages that fix one security issue, several bugs and add
various enhancements are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update fixes the following bugs:
* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat
Enterprise Linux 5.6. A code audit found a minor API change that effected
error messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 –
0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send
VIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected
VIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2
client saw a "Timed out during operation" message where it should see an
"Invalid network filter" error. This update adds a backported patch that
allows libvirt 0.8.2 clients to interoperate with the API as used by
libvirt 0.7.x servers, ensuring correct error messages are sent.
(BZ#665075)
* libvirt could crash if the maximum number of open file descriptors
(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed
file descriptors outside the bounds of the set. With this update the
maximum number of open file descriptors can no longer grow larger than the
FD_SETSIZE value. (BZ#665549)
* A libvirt race condition was found. An array in the libvirt event
handlers was accessed with a lock temporarily released. In rare cases, if
one thread attempted to access this array but a second thread reallocated
the array before the first thread reacquired a lock, it could lead to the
first thread attempting to access freed memory, potentially causing libvirt
to crash. With this update libvirt no longer refers to the old array and,
consequently, behaves as expected. (BZ#671569)
* Guests connected to a passthrough NIC would kernel panic if a
system_reset signal was sent through the QEMU monitor. With this update you
can reset such guests as expected. (BZ#689880)
* When using the Xen kernel, the rpmbuild command failed on the xencapstest
test. With this update you can run rpmbuild successfully when using the Xen
kernel. (BZ#690459)
* When a disk was hot unplugged, "ret >= 0" was passed to the qemuAuditDisk
calls in disk hotunplug operations before ret was, in fact, set to 0. As
well, the error path jumped to the "cleanup" label prematurely. As a
consequence, hotunplug failures were not audited and hotunplug successes
were audited as failures. This was corrected and hot unplugging checks now
behave as expected. (BZ#710151)
* A conflict existed between filter update locking sequences and virtual
machine startup locking sequences. When a filter update occurred on one or
more virtual machines, a deadlock could consequently occur if a virtual
machine referencing a filter was started. This update changes and makes
more flexible several qemu locking sequences ensuring this deadlock no
longer occurs. (BZ#697749)
* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)
arguments without informing the caller. The consequent double-closes could
cause Domain restoration failure. This update alters the
qemudDomainSaveImageStartVM signature to prevent the double-closes.
(BZ#681623)
This update also adds the following enhancements:
* The libvirt Xen driver now supports more than one serial port.
(BZ#670789)
* Enabling and disabling the High Precision Event Timer (HPET) in Xen
domains is now possible. (BZ#703193)
All libvirt users should install this update which addresses this
vulnerability, fixes these bugs and adds these enhancements. After
installing the updated packages, libvirtd must be restarted ("service
libvirtd restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue, several bugs and add\nvarious enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update fixes the following bugs:\n\n* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat\nEnterprise Linux 5.6. A code audit found a minor API change that effected\nerror messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 \u2013\n0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send\nVIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected\nVIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2\nclient saw a \"Timed out during operation\" message where it should see an\n\"Invalid network filter\" error. This update adds a backported patch that\nallows libvirt 0.8.2 clients to interoperate with the API as used by\nlibvirt 0.7.x servers, ensuring correct error messages are sent.\n(BZ#665075)\n\n* libvirt could crash if the maximum number of open file descriptors\n(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed\nfile descriptors outside the bounds of the set. With this update the\nmaximum number of open file descriptors can no longer grow larger than the\nFD_SETSIZE value. (BZ#665549)\n\n* A libvirt race condition was found. An array in the libvirt event\nhandlers was accessed with a lock temporarily released. In rare cases, if\none thread attempted to access this array but a second thread reallocated\nthe array before the first thread reacquired a lock, it could lead to the\nfirst thread attempting to access freed memory, potentially causing libvirt\nto crash. With this update libvirt no longer refers to the old array and,\nconsequently, behaves as expected. (BZ#671569)\n\n* Guests connected to a passthrough NIC would kernel panic if a\nsystem_reset signal was sent through the QEMU monitor. With this update you\ncan reset such guests as expected. (BZ#689880)\n\n* When using the Xen kernel, the rpmbuild command failed on the xencapstest\ntest. With this update you can run rpmbuild successfully when using the Xen\nkernel. (BZ#690459)\n\n* When a disk was hot unplugged, \"ret \u003e= 0\" was passed to the qemuAuditDisk\ncalls in disk hotunplug operations before ret was, in fact, set to 0. As\nwell, the error path jumped to the \"cleanup\" label prematurely. As a\nconsequence, hotunplug failures were not audited and hotunplug successes\nwere audited as failures. This was corrected and hot unplugging checks now\nbehave as expected. (BZ#710151)\n\n* A conflict existed between filter update locking sequences and virtual\nmachine startup locking sequences. When a filter update occurred on one or\nmore virtual machines, a deadlock could consequently occur if a virtual\nmachine referencing a filter was started. This update changes and makes\nmore flexible several qemu locking sequences ensuring this deadlock no\nlonger occurs. (BZ#697749)\n\n* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)\narguments without informing the caller. The consequent double-closes could\ncause Domain restoration failure. This update alters the\nqemudDomainSaveImageStartVM signature to prevent the double-closes.\n(BZ#681623)\n\nThis update also adds the following enhancements:\n\n* The libvirt Xen driver now supports more than one serial port.\n(BZ#670789)\n\n* Enabling and disabling the High Precision Event Timer (HPET) in Xen\ndomains is now possible. (BZ#703193)\n\nAll libvirt users should install this update which addresses this\nvulnerability, fixes these bugs and adds these enhancements. After\ninstalling the updated packages, libvirtd must be restarted (\"service\nlibvirtd restart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1019", "url": "https://access.redhat.com/errata/RHSA-2011:1019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "665075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665075" }, { "category": "external", "summary": "665549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665549" }, { "category": "external", "summary": "671569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671569" }, { "category": "external", "summary": "681623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681623" }, { "category": "external", "summary": "689880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689880" }, { "category": "external", "summary": "690459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690459" }, { "category": "external", "summary": "697749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697749" }, { "category": "external", "summary": "703193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703193" }, { "category": "external", "summary": "710151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710151" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1019.json" } ], "title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:19:09+00:00", "generator": { "date": "2024-11-22T04:19:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1019", "initial_release_date": "2011-07-21T09:23:00+00:00", "revision_history": [ { "date": "2011-07-21T09:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-07-21T06:31:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-0:0.8.2-22.el5.ia64", "product_id": "libvirt-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product_id": "libvirt-python-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_id": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.src", "product": { "name": "libvirt-0:0.8.2-22.el5.src", "product_id": "libvirt-0:0.8.2-22.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-0:0.8.2-22.el5.i386", "product_id": "libvirt-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product_id": "libvirt-devel-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-python-0:0.8.2-22.el5.i386", "product_id": "libvirt-python-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-07-21T09:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
RHSA-2011:1019
Vulnerability from csaf_redhat
Published
2011-07-21 09:23
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
Notes
Topic
Updated libvirt packages that fix one security issue, several bugs and add
various enhancements are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update fixes the following bugs:
* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat
Enterprise Linux 5.6. A code audit found a minor API change that effected
error messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 –
0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send
VIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected
VIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2
client saw a "Timed out during operation" message where it should see an
"Invalid network filter" error. This update adds a backported patch that
allows libvirt 0.8.2 clients to interoperate with the API as used by
libvirt 0.7.x servers, ensuring correct error messages are sent.
(BZ#665075)
* libvirt could crash if the maximum number of open file descriptors
(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed
file descriptors outside the bounds of the set. With this update the
maximum number of open file descriptors can no longer grow larger than the
FD_SETSIZE value. (BZ#665549)
* A libvirt race condition was found. An array in the libvirt event
handlers was accessed with a lock temporarily released. In rare cases, if
one thread attempted to access this array but a second thread reallocated
the array before the first thread reacquired a lock, it could lead to the
first thread attempting to access freed memory, potentially causing libvirt
to crash. With this update libvirt no longer refers to the old array and,
consequently, behaves as expected. (BZ#671569)
* Guests connected to a passthrough NIC would kernel panic if a
system_reset signal was sent through the QEMU monitor. With this update you
can reset such guests as expected. (BZ#689880)
* When using the Xen kernel, the rpmbuild command failed on the xencapstest
test. With this update you can run rpmbuild successfully when using the Xen
kernel. (BZ#690459)
* When a disk was hot unplugged, "ret >= 0" was passed to the qemuAuditDisk
calls in disk hotunplug operations before ret was, in fact, set to 0. As
well, the error path jumped to the "cleanup" label prematurely. As a
consequence, hotunplug failures were not audited and hotunplug successes
were audited as failures. This was corrected and hot unplugging checks now
behave as expected. (BZ#710151)
* A conflict existed between filter update locking sequences and virtual
machine startup locking sequences. When a filter update occurred on one or
more virtual machines, a deadlock could consequently occur if a virtual
machine referencing a filter was started. This update changes and makes
more flexible several qemu locking sequences ensuring this deadlock no
longer occurs. (BZ#697749)
* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)
arguments without informing the caller. The consequent double-closes could
cause Domain restoration failure. This update alters the
qemudDomainSaveImageStartVM signature to prevent the double-closes.
(BZ#681623)
This update also adds the following enhancements:
* The libvirt Xen driver now supports more than one serial port.
(BZ#670789)
* Enabling and disabling the High Precision Event Timer (HPET) in Xen
domains is now possible. (BZ#703193)
All libvirt users should install this update which addresses this
vulnerability, fixes these bugs and adds these enhancements. After
installing the updated packages, libvirtd must be restarted ("service
libvirtd restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue, several bugs and add\nvarious enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update fixes the following bugs:\n\n* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat\nEnterprise Linux 5.6. A code audit found a minor API change that effected\nerror messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 \u2013\n0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send\nVIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected\nVIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2\nclient saw a \"Timed out during operation\" message where it should see an\n\"Invalid network filter\" error. This update adds a backported patch that\nallows libvirt 0.8.2 clients to interoperate with the API as used by\nlibvirt 0.7.x servers, ensuring correct error messages are sent.\n(BZ#665075)\n\n* libvirt could crash if the maximum number of open file descriptors\n(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed\nfile descriptors outside the bounds of the set. With this update the\nmaximum number of open file descriptors can no longer grow larger than the\nFD_SETSIZE value. (BZ#665549)\n\n* A libvirt race condition was found. An array in the libvirt event\nhandlers was accessed with a lock temporarily released. In rare cases, if\none thread attempted to access this array but a second thread reallocated\nthe array before the first thread reacquired a lock, it could lead to the\nfirst thread attempting to access freed memory, potentially causing libvirt\nto crash. With this update libvirt no longer refers to the old array and,\nconsequently, behaves as expected. (BZ#671569)\n\n* Guests connected to a passthrough NIC would kernel panic if a\nsystem_reset signal was sent through the QEMU monitor. With this update you\ncan reset such guests as expected. (BZ#689880)\n\n* When using the Xen kernel, the rpmbuild command failed on the xencapstest\ntest. With this update you can run rpmbuild successfully when using the Xen\nkernel. (BZ#690459)\n\n* When a disk was hot unplugged, \"ret \u003e= 0\" was passed to the qemuAuditDisk\ncalls in disk hotunplug operations before ret was, in fact, set to 0. As\nwell, the error path jumped to the \"cleanup\" label prematurely. As a\nconsequence, hotunplug failures were not audited and hotunplug successes\nwere audited as failures. This was corrected and hot unplugging checks now\nbehave as expected. (BZ#710151)\n\n* A conflict existed between filter update locking sequences and virtual\nmachine startup locking sequences. When a filter update occurred on one or\nmore virtual machines, a deadlock could consequently occur if a virtual\nmachine referencing a filter was started. This update changes and makes\nmore flexible several qemu locking sequences ensuring this deadlock no\nlonger occurs. (BZ#697749)\n\n* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)\narguments without informing the caller. The consequent double-closes could\ncause Domain restoration failure. This update alters the\nqemudDomainSaveImageStartVM signature to prevent the double-closes.\n(BZ#681623)\n\nThis update also adds the following enhancements:\n\n* The libvirt Xen driver now supports more than one serial port.\n(BZ#670789)\n\n* Enabling and disabling the High Precision Event Timer (HPET) in Xen\ndomains is now possible. (BZ#703193)\n\nAll libvirt users should install this update which addresses this\nvulnerability, fixes these bugs and adds these enhancements. After\ninstalling the updated packages, libvirtd must be restarted (\"service\nlibvirtd restart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1019", "url": "https://access.redhat.com/errata/RHSA-2011:1019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "665075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665075" }, { "category": "external", "summary": "665549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665549" }, { "category": "external", "summary": "671569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671569" }, { "category": "external", "summary": "681623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681623" }, { "category": "external", "summary": "689880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689880" }, { "category": "external", "summary": "690459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690459" }, { "category": "external", "summary": "697749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697749" }, { "category": "external", "summary": "703193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703193" }, { "category": "external", "summary": "710151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710151" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1019.json" } ], "title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:19:09+00:00", "generator": { "date": "2024-11-22T04:19:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1019", "initial_release_date": "2011-07-21T09:23:00+00:00", "revision_history": [ { "date": "2011-07-21T09:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-07-21T06:31:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-0:0.8.2-22.el5.ia64", "product_id": "libvirt-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product_id": "libvirt-python-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_id": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.src", "product": { "name": "libvirt-0:0.8.2-22.el5.src", "product_id": "libvirt-0:0.8.2-22.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-0:0.8.2-22.el5.i386", "product_id": "libvirt-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product_id": "libvirt-devel-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-python-0:0.8.2-22.el5.i386", "product_id": "libvirt-python-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-07-21T09:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
rhsa-2011:1197
Vulnerability from csaf_redhat
Published
2011-08-23 14:37
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security and bug fix update
Notes
Topic
Updated libvirt packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remotely managing virtualized systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update also fixes the following bugs:
* Previously, when the "virsh vol-create-from" command was run on an LVM
(Logical Volume Manager) storage pool, performance of the command was very
low and the operation consumed an excessive amount of time. This bug has
been fixed in the virStorageVolCreateXMLFrom() function, and the
performance problem of the command no longer occurs.
* Due to a regression, libvirt used undocumented command line options,
instead of the recommended ones. Consequently, the qemu-img utility used an
invalid argument while creating an encrypted volume, and the process
eventually failed. With this update, the bug in the backing format of the
storage back end has been fixed, and encrypted volumes can now be created
as expected. (BZ#726617)
* Due to a bug in the qemuAuditDisk() function, hot unplug failures were
never audited, and a hot unplug success was audited as a failure. This bug
has been fixed, and auditing of disk hot unplug operations now works as
expected. (BZ#728516)
* Previously, when a debug process was being activated, the act of
preparing a debug message ended up with dereferencing a UUID (universally
unique identifier) prior to the NULL argument check. Consequently, an API
running the debug process sometimes terminated with a segmentation fault.
With this update, a patch has been provided to address this issue, and the
crashes no longer occur in the described scenario. (BZ#728546)
* The libvirt library uses the "boot=on" option to mark which disk is
bootable but it only uses that option if Qemu advertises its support. The
qemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that
option and libvirt could not use it. As a consequence, when an IDE disk was
added as the second storage with a virtio disk being set up as the first
one by default, the operating system tried to boot from the IDE disk rather
than the virtio disk and either failed to boot with the "No bootable disk"
error message returned, or the system booted whatever operating system was
on the IDE disk. With this update, the boot configuration is translated
into bootindex, which provides control over which device is used for
booting a guest operating system, thus fixing this bug.
All users of libvirt are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, libvirtd must be restarted ("service libvirtd
restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remotely managing virtualized systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update also fixes the following bugs:\n\n* Previously, when the \"virsh vol-create-from\" command was run on an LVM\n(Logical Volume Manager) storage pool, performance of the command was very\nlow and the operation consumed an excessive amount of time. This bug has\nbeen fixed in the virStorageVolCreateXMLFrom() function, and the\nperformance problem of the command no longer occurs.\n\n* Due to a regression, libvirt used undocumented command line options,\ninstead of the recommended ones. Consequently, the qemu-img utility used an\ninvalid argument while creating an encrypted volume, and the process\neventually failed. With this update, the bug in the backing format of the\nstorage back end has been fixed, and encrypted volumes can now be created\nas expected. (BZ#726617)\n\n* Due to a bug in the qemuAuditDisk() function, hot unplug failures were\nnever audited, and a hot unplug success was audited as a failure. This bug\nhas been fixed, and auditing of disk hot unplug operations now works as\nexpected. (BZ#728516)\n\n* Previously, when a debug process was being activated, the act of\npreparing a debug message ended up with dereferencing a UUID (universally\nunique identifier) prior to the NULL argument check. Consequently, an API\nrunning the debug process sometimes terminated with a segmentation fault.\nWith this update, a patch has been provided to address this issue, and the\ncrashes no longer occur in the described scenario. (BZ#728546)\n\n* The libvirt library uses the \"boot=on\" option to mark which disk is\nbootable but it only uses that option if Qemu advertises its support. The\nqemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that\noption and libvirt could not use it. As a consequence, when an IDE disk was\nadded as the second storage with a virtio disk being set up as the first\none by default, the operating system tried to boot from the IDE disk rather\nthan the virtio disk and either failed to boot with the \"No bootable disk\"\nerror message returned, or the system booted whatever operating system was\non the IDE disk. With this update, the boot configuration is translated\ninto bootindex, which provides control over which device is used for\nbooting a guest operating system, thus fixing this bug.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, libvirtd must be restarted (\"service libvirtd\nrestart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1197", "url": "https://access.redhat.com/errata/RHSA-2011:1197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "726617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726617" }, { "category": "external", "summary": "728516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728516" }, { "category": "external", "summary": "728546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728546" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1197.json" } ], "title": "Red Hat Security Advisory: libvirt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:19:13+00:00", "generator": { "date": "2024-11-22T04:19:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1197", "initial_release_date": "2011-08-23T14:37:00+00:00", "revision_history": [ { "date": "2011-08-23T14:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-08-23T10:40:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product_id": "libvirt-0:0.8.7-18.el6_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-08-23T14:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
RHSA-2011:1197
Vulnerability from csaf_redhat
Published
2011-08-23 14:37
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security and bug fix update
Notes
Topic
Updated libvirt packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remotely managing virtualized systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update also fixes the following bugs:
* Previously, when the "virsh vol-create-from" command was run on an LVM
(Logical Volume Manager) storage pool, performance of the command was very
low and the operation consumed an excessive amount of time. This bug has
been fixed in the virStorageVolCreateXMLFrom() function, and the
performance problem of the command no longer occurs.
* Due to a regression, libvirt used undocumented command line options,
instead of the recommended ones. Consequently, the qemu-img utility used an
invalid argument while creating an encrypted volume, and the process
eventually failed. With this update, the bug in the backing format of the
storage back end has been fixed, and encrypted volumes can now be created
as expected. (BZ#726617)
* Due to a bug in the qemuAuditDisk() function, hot unplug failures were
never audited, and a hot unplug success was audited as a failure. This bug
has been fixed, and auditing of disk hot unplug operations now works as
expected. (BZ#728516)
* Previously, when a debug process was being activated, the act of
preparing a debug message ended up with dereferencing a UUID (universally
unique identifier) prior to the NULL argument check. Consequently, an API
running the debug process sometimes terminated with a segmentation fault.
With this update, a patch has been provided to address this issue, and the
crashes no longer occur in the described scenario. (BZ#728546)
* The libvirt library uses the "boot=on" option to mark which disk is
bootable but it only uses that option if Qemu advertises its support. The
qemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that
option and libvirt could not use it. As a consequence, when an IDE disk was
added as the second storage with a virtio disk being set up as the first
one by default, the operating system tried to boot from the IDE disk rather
than the virtio disk and either failed to boot with the "No bootable disk"
error message returned, or the system booted whatever operating system was
on the IDE disk. With this update, the boot configuration is translated
into bootindex, which provides control over which device is used for
booting a guest operating system, thus fixing this bug.
All users of libvirt are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, libvirtd must be restarted ("service libvirtd
restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remotely managing virtualized systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update also fixes the following bugs:\n\n* Previously, when the \"virsh vol-create-from\" command was run on an LVM\n(Logical Volume Manager) storage pool, performance of the command was very\nlow and the operation consumed an excessive amount of time. This bug has\nbeen fixed in the virStorageVolCreateXMLFrom() function, and the\nperformance problem of the command no longer occurs.\n\n* Due to a regression, libvirt used undocumented command line options,\ninstead of the recommended ones. Consequently, the qemu-img utility used an\ninvalid argument while creating an encrypted volume, and the process\neventually failed. With this update, the bug in the backing format of the\nstorage back end has been fixed, and encrypted volumes can now be created\nas expected. (BZ#726617)\n\n* Due to a bug in the qemuAuditDisk() function, hot unplug failures were\nnever audited, and a hot unplug success was audited as a failure. This bug\nhas been fixed, and auditing of disk hot unplug operations now works as\nexpected. (BZ#728516)\n\n* Previously, when a debug process was being activated, the act of\npreparing a debug message ended up with dereferencing a UUID (universally\nunique identifier) prior to the NULL argument check. Consequently, an API\nrunning the debug process sometimes terminated with a segmentation fault.\nWith this update, a patch has been provided to address this issue, and the\ncrashes no longer occur in the described scenario. (BZ#728546)\n\n* The libvirt library uses the \"boot=on\" option to mark which disk is\nbootable but it only uses that option if Qemu advertises its support. The\nqemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that\noption and libvirt could not use it. As a consequence, when an IDE disk was\nadded as the second storage with a virtio disk being set up as the first\none by default, the operating system tried to boot from the IDE disk rather\nthan the virtio disk and either failed to boot with the \"No bootable disk\"\nerror message returned, or the system booted whatever operating system was\non the IDE disk. With this update, the boot configuration is translated\ninto bootindex, which provides control over which device is used for\nbooting a guest operating system, thus fixing this bug.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, libvirtd must be restarted (\"service libvirtd\nrestart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1197", "url": "https://access.redhat.com/errata/RHSA-2011:1197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "726617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726617" }, { "category": "external", "summary": "728516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728516" }, { "category": "external", "summary": "728546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728546" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1197.json" } ], "title": "Red Hat Security Advisory: libvirt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:19:13+00:00", "generator": { "date": "2024-11-22T04:19:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1197", "initial_release_date": "2011-08-23T14:37:00+00:00", "revision_history": [ { "date": "2011-08-23T14:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-08-23T10:40:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product_id": "libvirt-0:0.8.7-18.el6_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-08-23T14:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
rhsa-2011:1019
Vulnerability from csaf_redhat
Published
2011-07-21 09:23
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
Notes
Topic
Updated libvirt packages that fix one security issue, several bugs and add
various enhancements are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update fixes the following bugs:
* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat
Enterprise Linux 5.6. A code audit found a minor API change that effected
error messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 –
0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send
VIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected
VIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2
client saw a "Timed out during operation" message where it should see an
"Invalid network filter" error. This update adds a backported patch that
allows libvirt 0.8.2 clients to interoperate with the API as used by
libvirt 0.7.x servers, ensuring correct error messages are sent.
(BZ#665075)
* libvirt could crash if the maximum number of open file descriptors
(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed
file descriptors outside the bounds of the set. With this update the
maximum number of open file descriptors can no longer grow larger than the
FD_SETSIZE value. (BZ#665549)
* A libvirt race condition was found. An array in the libvirt event
handlers was accessed with a lock temporarily released. In rare cases, if
one thread attempted to access this array but a second thread reallocated
the array before the first thread reacquired a lock, it could lead to the
first thread attempting to access freed memory, potentially causing libvirt
to crash. With this update libvirt no longer refers to the old array and,
consequently, behaves as expected. (BZ#671569)
* Guests connected to a passthrough NIC would kernel panic if a
system_reset signal was sent through the QEMU monitor. With this update you
can reset such guests as expected. (BZ#689880)
* When using the Xen kernel, the rpmbuild command failed on the xencapstest
test. With this update you can run rpmbuild successfully when using the Xen
kernel. (BZ#690459)
* When a disk was hot unplugged, "ret >= 0" was passed to the qemuAuditDisk
calls in disk hotunplug operations before ret was, in fact, set to 0. As
well, the error path jumped to the "cleanup" label prematurely. As a
consequence, hotunplug failures were not audited and hotunplug successes
were audited as failures. This was corrected and hot unplugging checks now
behave as expected. (BZ#710151)
* A conflict existed between filter update locking sequences and virtual
machine startup locking sequences. When a filter update occurred on one or
more virtual machines, a deadlock could consequently occur if a virtual
machine referencing a filter was started. This update changes and makes
more flexible several qemu locking sequences ensuring this deadlock no
longer occurs. (BZ#697749)
* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)
arguments without informing the caller. The consequent double-closes could
cause Domain restoration failure. This update alters the
qemudDomainSaveImageStartVM signature to prevent the double-closes.
(BZ#681623)
This update also adds the following enhancements:
* The libvirt Xen driver now supports more than one serial port.
(BZ#670789)
* Enabling and disabling the High Precision Event Timer (HPET) in Xen
domains is now possible. (BZ#703193)
All libvirt users should install this update which addresses this
vulnerability, fixes these bugs and adds these enhancements. After
installing the updated packages, libvirtd must be restarted ("service
libvirtd restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue, several bugs and add\nvarious enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update fixes the following bugs:\n\n* libvirt was rebased from version 0.6.3 to version 0.8.2 in Red Hat\nEnterprise Linux 5.6. A code audit found a minor API change that effected\nerror messages seen by libvirt 0.8.2 clients talking to libvirt 0.7.1 \u2013\n0.7.7 (0.7.x) servers. A libvirt 0.7.x server could send\nVIR_ERR_BUILD_FIREWALL errors where a libvirt 0.8.2 client expected\nVIR_ERR_CONFIG_UNSUPPORTED errors. In other circumstances, a libvirt 0.8.2\nclient saw a \"Timed out during operation\" message where it should see an\n\"Invalid network filter\" error. This update adds a backported patch that\nallows libvirt 0.8.2 clients to interoperate with the API as used by\nlibvirt 0.7.x servers, ensuring correct error messages are sent.\n(BZ#665075)\n\n* libvirt could crash if the maximum number of open file descriptors\n(_SC_OPEN_MAX) grew larger than the FD_SETSIZE value because it accessed\nfile descriptors outside the bounds of the set. With this update the\nmaximum number of open file descriptors can no longer grow larger than the\nFD_SETSIZE value. (BZ#665549)\n\n* A libvirt race condition was found. An array in the libvirt event\nhandlers was accessed with a lock temporarily released. In rare cases, if\none thread attempted to access this array but a second thread reallocated\nthe array before the first thread reacquired a lock, it could lead to the\nfirst thread attempting to access freed memory, potentially causing libvirt\nto crash. With this update libvirt no longer refers to the old array and,\nconsequently, behaves as expected. (BZ#671569)\n\n* Guests connected to a passthrough NIC would kernel panic if a\nsystem_reset signal was sent through the QEMU monitor. With this update you\ncan reset such guests as expected. (BZ#689880)\n\n* When using the Xen kernel, the rpmbuild command failed on the xencapstest\ntest. With this update you can run rpmbuild successfully when using the Xen\nkernel. (BZ#690459)\n\n* When a disk was hot unplugged, \"ret \u003e= 0\" was passed to the qemuAuditDisk\ncalls in disk hotunplug operations before ret was, in fact, set to 0. As\nwell, the error path jumped to the \"cleanup\" label prematurely. As a\nconsequence, hotunplug failures were not audited and hotunplug successes\nwere audited as failures. This was corrected and hot unplugging checks now\nbehave as expected. (BZ#710151)\n\n* A conflict existed between filter update locking sequences and virtual\nmachine startup locking sequences. When a filter update occurred on one or\nmore virtual machines, a deadlock could consequently occur if a virtual\nmachine referencing a filter was started. This update changes and makes\nmore flexible several qemu locking sequences ensuring this deadlock no\nlonger occurs. (BZ#697749)\n\n* qemudDomainSaveImageStartVM closed some incoming file descriptor (fd)\narguments without informing the caller. The consequent double-closes could\ncause Domain restoration failure. This update alters the\nqemudDomainSaveImageStartVM signature to prevent the double-closes.\n(BZ#681623)\n\nThis update also adds the following enhancements:\n\n* The libvirt Xen driver now supports more than one serial port.\n(BZ#670789)\n\n* Enabling and disabling the High Precision Event Timer (HPET) in Xen\ndomains is now possible. (BZ#703193)\n\nAll libvirt users should install this update which addresses this\nvulnerability, fixes these bugs and adds these enhancements. After\ninstalling the updated packages, libvirtd must be restarted (\"service\nlibvirtd restart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1019", "url": "https://access.redhat.com/errata/RHSA-2011:1019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "665075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665075" }, { "category": "external", "summary": "665549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665549" }, { "category": "external", "summary": "671569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671569" }, { "category": "external", "summary": "681623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681623" }, { "category": "external", "summary": "689880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689880" }, { "category": "external", "summary": "690459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690459" }, { "category": "external", "summary": "697749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=697749" }, { "category": "external", "summary": "703193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703193" }, { "category": "external", "summary": "710151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710151" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1019.json" } ], "title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:19:09+00:00", "generator": { "date": "2024-11-22T04:19:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1019", "initial_release_date": "2011-07-21T09:23:00+00:00", "revision_history": [ { "date": "2011-07-21T09:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-07-21T06:31:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-0:0.8.2-22.el5.ia64", "product_id": "libvirt-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.ia64", "product_id": "libvirt-python-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=ia64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_id": "libvirt-devel-0:0.8.2-22.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.src", "product": { "name": "libvirt-0:0.8.2-22.el5.src", "product_id": "libvirt-0:0.8.2-22.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-python-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_id": "libvirt-devel-0:0.8.2-22.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-0:0.8.2-22.el5.i386", "product_id": "libvirt-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_id": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-devel-0:0.8.2-22.el5.i386", "product_id": "libvirt-devel-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-22.el5?arch=i386" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.2-22.el5.i386", "product": { "name": "libvirt-python-0:0.8.2-22.el5.i386", "product_id": "libvirt-python-0:0.8.2-22.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.2-22.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Client-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.src" }, "product_reference": "libvirt-0:0.8.2-22.el5.src", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-devel-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.i386", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.ia64", "relates_to_product_reference": "5Server-VT" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.2-22.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)", "product_id": "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" }, "product_reference": "libvirt-python-0:0.8.2-22.el5.x86_64", "relates_to_product_reference": "5Server-VT" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-07-21T09:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-VT:libvirt-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-0:0.8.2-22.el5.src", "5Client-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Client-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Client-VT:libvirt-python-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-0:0.8.2-22.el5.src", "5Server-VT:libvirt-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-debuginfo-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-devel-0:0.8.2-22.el5.x86_64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.i386", "5Server-VT:libvirt-python-0:0.8.2-22.el5.ia64", "5Server-VT:libvirt-python-0:0.8.2-22.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
rhsa-2011_1197
Vulnerability from csaf_redhat
Published
2011-08-23 14:37
Modified
2024-11-22 04:19
Summary
Red Hat Security Advisory: libvirt security and bug fix update
Notes
Topic
Updated libvirt packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remotely managing virtualized systems.
An integer overflow flaw was found in libvirtd's RPC call handling. An
attacker able to establish read-only connections to libvirtd could trigger
this flaw by calling virDomainGetVcpus() with specially-crafted parameters,
causing libvirtd to crash. (CVE-2011-2511)
This update also fixes the following bugs:
* Previously, when the "virsh vol-create-from" command was run on an LVM
(Logical Volume Manager) storage pool, performance of the command was very
low and the operation consumed an excessive amount of time. This bug has
been fixed in the virStorageVolCreateXMLFrom() function, and the
performance problem of the command no longer occurs.
* Due to a regression, libvirt used undocumented command line options,
instead of the recommended ones. Consequently, the qemu-img utility used an
invalid argument while creating an encrypted volume, and the process
eventually failed. With this update, the bug in the backing format of the
storage back end has been fixed, and encrypted volumes can now be created
as expected. (BZ#726617)
* Due to a bug in the qemuAuditDisk() function, hot unplug failures were
never audited, and a hot unplug success was audited as a failure. This bug
has been fixed, and auditing of disk hot unplug operations now works as
expected. (BZ#728516)
* Previously, when a debug process was being activated, the act of
preparing a debug message ended up with dereferencing a UUID (universally
unique identifier) prior to the NULL argument check. Consequently, an API
running the debug process sometimes terminated with a segmentation fault.
With this update, a patch has been provided to address this issue, and the
crashes no longer occur in the described scenario. (BZ#728546)
* The libvirt library uses the "boot=on" option to mark which disk is
bootable but it only uses that option if Qemu advertises its support. The
qemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that
option and libvirt could not use it. As a consequence, when an IDE disk was
added as the second storage with a virtio disk being set up as the first
one by default, the operating system tried to boot from the IDE disk rather
than the virtio disk and either failed to boot with the "No bootable disk"
error message returned, or the system booted whatever operating system was
on the IDE disk. With this update, the boot configuration is translated
into bootindex, which provides control over which device is used for
booting a guest operating system, thus fixing this bug.
All users of libvirt are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, libvirtd must be restarted ("service libvirtd
restart") for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remotely managing virtualized systems.\n\nAn integer overflow flaw was found in libvirtd\u0027s RPC call handling. An\nattacker able to establish read-only connections to libvirtd could trigger\nthis flaw by calling virDomainGetVcpus() with specially-crafted parameters,\ncausing libvirtd to crash. (CVE-2011-2511)\n\nThis update also fixes the following bugs:\n\n* Previously, when the \"virsh vol-create-from\" command was run on an LVM\n(Logical Volume Manager) storage pool, performance of the command was very\nlow and the operation consumed an excessive amount of time. This bug has\nbeen fixed in the virStorageVolCreateXMLFrom() function, and the\nperformance problem of the command no longer occurs.\n\n* Due to a regression, libvirt used undocumented command line options,\ninstead of the recommended ones. Consequently, the qemu-img utility used an\ninvalid argument while creating an encrypted volume, and the process\neventually failed. With this update, the bug in the backing format of the\nstorage back end has been fixed, and encrypted volumes can now be created\nas expected. (BZ#726617)\n\n* Due to a bug in the qemuAuditDisk() function, hot unplug failures were\nnever audited, and a hot unplug success was audited as a failure. This bug\nhas been fixed, and auditing of disk hot unplug operations now works as\nexpected. (BZ#728516)\n\n* Previously, when a debug process was being activated, the act of\npreparing a debug message ended up with dereferencing a UUID (universally\nunique identifier) prior to the NULL argument check. Consequently, an API\nrunning the debug process sometimes terminated with a segmentation fault.\nWith this update, a patch has been provided to address this issue, and the\ncrashes no longer occur in the described scenario. (BZ#728546)\n\n* The libvirt library uses the \"boot=on\" option to mark which disk is\nbootable but it only uses that option if Qemu advertises its support. The\nqemu-kvm utility in Red Hat Enterprise Linux 6.1 removed support for that\noption and libvirt could not use it. As a consequence, when an IDE disk was\nadded as the second storage with a virtio disk being set up as the first\none by default, the operating system tried to boot from the IDE disk rather\nthan the virtio disk and either failed to boot with the \"No bootable disk\"\nerror message returned, or the system booted whatever operating system was\non the IDE disk. With this update, the boot configuration is translated\ninto bootindex, which provides control over which device is used for\nbooting a guest operating system, thus fixing this bug.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, libvirtd must be restarted (\"service libvirtd\nrestart\") for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1197", "url": "https://access.redhat.com/errata/RHSA-2011:1197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "726617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726617" }, { "category": "external", "summary": "728516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728516" }, { "category": "external", "summary": "728546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728546" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1197.json" } ], "title": "Red Hat Security Advisory: libvirt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:19:13+00:00", "generator": { "date": "2024-11-22T04:19:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1197", "initial_release_date": "2011-08-23T14:37:00+00:00", "revision_history": [ { "date": "2011-08-23T14:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-08-23T10:40:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:19:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_id": "libvirt-0:0.8.7-18.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_id": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_id": "libvirt-0:0.8.7-18.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.8.7-18.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_id": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.7-18.el6_1.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product": { "name": "libvirt-0:0.8.7-18.el6_1.1.src", "product_id": "libvirt-0:0.8.7-18.el6_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.8.7-18.el6_1.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" }, "product_reference": "libvirt-python-0:0.8.7-18.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2511", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "717199" } ], "notes": [ { "category": "description", "text": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt: integer overflow in VirDomainGetVcpus", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "category": "external", "summary": "RHBZ#717199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" } ], "release_date": "2011-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-08-23T14:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.src", "6Server-6.1.z:libvirt-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-client-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-debuginfo-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-devel-0:0.8.7-18.el6_1.1.x86_64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.i686", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.ppc64", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.s390x", "6Server-6.1.z:libvirt-python-0:0.8.7-18.el6_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt: integer overflow in VirDomainGetVcpus" } ] }
ghsa-vxfh-2pc2-vcmc
Vulnerability from github
Published
2022-05-17 01:54
Modified
2022-05-17 01:54
Details
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
{ "affected": [], "aliases": [ "CVE-2011-2511" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-08-10T20:55:00Z", "severity": "MODERATE" }, "details": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.", "id": "GHSA-vxfh-2pc2-vcmc", "modified": "2022-05-17T01:54:55Z", "published": "2022-05-17T01:54:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2511" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1019" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1197" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2011-2511" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717199" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "type": "WEB", "url": "https://hermes.opensuse.org/messages/10027908" }, { "type": "WEB", "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" }, { "type": "WEB", "url": "http://libvirt.org/news.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/45375" }, { "type": "WEB", "url": "http://secunia.com/advisories/45441" }, { "type": "WEB", "url": "http://secunia.com/advisories/45446" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2280" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025822" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1180-1" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2011-2511
Vulnerability from fkie_nvd
Published
2011-08-10 20:55
Modified
2024-11-21 01:28
Severity ?
Summary
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB82706-26C4-48C5-8918-EBFD96411440", "versionEndIncluding": "0.9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AFF5EF5-280A-499B-BD63-361EDC49A923", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DE616C79-74E0-4876-83D7-BE04CB954F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "87FF4782-A017-4D6F-9588-BE0AD4AA04E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "FF62226E-E4FE-4AF5-86A2-344148158A22", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C540F8A3-E12A-403B-81D2-CDB28DE03E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0900588-EBF9-4459-B1D7-588B72E40689", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FE650A9D-D12D-43C5-B276-B3116CF096F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "359F1970-822B-4430-86EB-15091B2B4338", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D08DB661-40DF-4234-9F6B-2EE0746FAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E86D1293-6881-4F9D-B245-E16040921DF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C49F1101-0845-478F-BEA1-67185A763D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "DA319732-E860-459E-9C20-ED31D90510DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "06B16020-5330-4F99-8DD3-8B4037E22CFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BCA6D83-281F-4B28-9CB2-253614017B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C97CB42C-C89F-4BE6-80AC-A020EBF369FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCC2F2D6-90E3-4306-A29A-0A507BDF889C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB533B81-AFF3-442E-A499-555F2181F64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "53AD34A3-9097-4375-BB30-CAED13987396", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "80E37E3B-18A8-4D34-9400-2C18D0DBAAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "36EAE07C-284D-4BEB-ABDF-28C157B3B90B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E28C5275-39D4-4C7C-A064-70161FE35802", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "643D7C4C-6BD9-49CE-A7FD-819300CA955C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "77476F3F-A914-4EC6-9488-189BD9E1AE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B22C7B3D-169D-45CC-B1C1-9864991B3E05", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3D6D1F10-2908-42E0-8D8F-1FBBC804505D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "450BD95B-5CE1-49E7-B6DB-6C14D9115CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "508578FC-BDC7-4B44-9F98-BD6CD657F57B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD25F37B-C666-4EDB-AD77-CCE04A800348", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8903EA9-D354-4C9E-B308-653689534AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F811BE37-6F53-4663-819F-E954787C345B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2886A659-24BD-483B-8FCD-5BC21573EE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "65FD148D-0088-47D5-AAC1-E0E990F9D170", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "84613074-CFA0-4C0B-B896-0751F652EA71", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BCCF73F-8542-4955-ACD6-44F199D49CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "05C7EF0F-C069-424A-9B3F-D07C72450ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F25DF6A-34D5-4D5B-AFAF-7A21202460EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "B67C29ED-2975-47F0-AE75-875A380ECC56", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "EC90B806-1FB3-434E-A664-2842AD3BA9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0054B43A-F844-47C8-B03A-01696117B7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "A5C78A50-0F41-405C-9ABA-EE088D0ABE60", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "8322F4E2-0AD0-497B-871E-233C0E0F1490", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E41CEF32-4998-41D5-B971-12E7F4E39FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E43FD74C-5986-4E9E-9C4F-9891133084A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBFD9B43-52BA-4FF9-84A1-369B1A96A166", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "10EE76EF-44D3-4645-B1E7-5BCFB4CB4204", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "934215BC-33D1-453F-B49B-23B52E580214", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "F274792B-F190-4A23-A551-6B07EA4028B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2059834-5A26-4DB9-B400-DBBE15690AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2F6277D-6732-44BA-91B4-D57877E011BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption." }, { "lang": "es", "value": "Desbordamiento de entero en libvirt anterior a v0.9.3 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda libvirtd) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada manipulada VirDomainGetVcpus RPC que provoca corrupci\u00f3n de memoria." } ], "id": "CVE-2011-2511", "lastModified": "2024-11-21T01:28:26.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-10T20:55:01.547", "references": [ { "source": "secalert@redhat.com", "url": "http://libvirt.org/news.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45375" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45441" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45446" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2280" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025822" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "source": "secalert@redhat.com", "url": "https://hermes.opensuse.org/messages/10027908" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://libvirt.org/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/28/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1180-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/10027908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.