Action not permitted
Modal body text goes here.
cve-2012-0029
Vulnerability from cvelistv5
Published
2012-01-27 15:00
Modified
2024-08-06 18:09
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:17.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "qemu-processtxdesc-bo(72656)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656" }, { "name": "47741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47741" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0" }, { "name": "47992", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47992" }, { "name": "48318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48318" }, { "name": "47740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47740" }, { "name": "RHSA-2012:0050", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0050.html" }, { "name": "openSUSE-SU-2012:0207", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" }, { "name": "USN-1339-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1339-1" }, { "name": "51642", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51642" }, { "name": "50913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50913" }, { "name": "SUSE-SU-2012:1320", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "RHSA-2012:0370", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0370.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "name": "FEDORA-2012-8604", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "qemu-processtxdesc-bo(72656)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656" }, { "name": "47741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47741" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0" }, { "name": "47992", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47992" }, { "name": "48318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48318" }, { "name": "47740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47740" }, { "name": "RHSA-2012:0050", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0050.html" }, { "name": "openSUSE-SU-2012:0207", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" }, { "name": "USN-1339-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1339-1" }, { "name": "51642", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51642" }, { "name": "50913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50913" }, { "name": "SUSE-SU-2012:1320", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "RHSA-2012:0370", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0370.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "name": "FEDORA-2012-8604", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0029", "datePublished": "2012-01-27T15:00:00", "dateReserved": "2011-12-07T00:00:00", "dateUpdated": "2024-08-06T18:09:17.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-0029\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-01-27T15:55:04.750\",\"lastModified\":\"2023-02-13T00:22:33.990\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de desbordamiento de buffer basado en memoria din\u00e1mica (heap)en la funci\u00f3n process_tx_desc en la emulaci\u00f3n de un e1000 (hw/e1000.c) en qemu-kvm v0.12, y posiblemente otras versiones, permite causar una denegaci\u00f3n de servicio (por ca\u00edda de QEMU) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a los usuarios del sistema operativo emulado a trav\u00e9s de paquetes de modo \u0027legacy\u0027 especificamente modificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:S/C:C/I:C/A:C\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.4},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":4.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kvm_group:qemu-kvm:0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E67322-2B2B-450B-B16F-67673557F8E1\"}]}]}],\"references\":[{\"url\":\"http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0370.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/47740\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47741\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47992\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48318\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/50913\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2012-0050.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/51642\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1339-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=772075\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/72656\",\"source\":\"secalert@redhat.com\"}]}}" } }
ghsa-8rxf-mc82-x3wv
Vulnerability from github
Published
2022-05-04 00:27
Modified
2022-05-04 00:27
Details
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
{ "affected": [], "aliases": [ "CVE-2012-0029" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-01-27T15:55:00Z", "severity": "HIGH" }, "details": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "id": "GHSA-8rxf-mc82-x3wv", "modified": "2022-05-04T00:27:43Z", "published": "2022-05-04T00:27:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0050" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0051" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0109" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0168" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:0370" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656" }, { "type": "WEB", "url": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0" }, { "type": "WEB", "url": "http://git.qemu.org/?p=qemu.git;a=log;h=refs/heads/stable-1.0" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0370.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/47740" }, { "type": "WEB", "url": "http://secunia.com/advisories/47741" }, { "type": "WEB", "url": "http://secunia.com/advisories/47992" }, { "type": "WEB", "url": "http://secunia.com/advisories/48318" }, { "type": "WEB", "url": "http://secunia.com/advisories/50913" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2012-0050.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/51642" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1339-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2012_0050
Vulnerability from csaf_redhat
Published
2012-01-23 18:51
Modified
2024-11-22 05:04
Summary
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
Notes
Topic
Updated qemu-kvm packages that fix one security issue, one bug, and add
one enhancement are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
Red Hat would like to thank Nicolae Mogoreanu for reporting this issue.
This update also fixes the following bug:
* qemu-kvm has a "scsi" option, to be used, for example, with the
"-device" option: "-device virtio-blk-pci,drive=[drive name],scsi=off".
Previously, however, it only masked the feature bit, and did not reject
SCSI commands if a malicious guest ignored the feature bit and issued a
request. This update corrects this issue. The "scsi=off" option can be
used to mitigate the virtualization aspect of CVE-2011-4127 before the
RHSA-2011:1849 kernel update is installed on the host.
This mitigation is only required if you do not have the RHSA-2011:1849
kernel update installed on the host and you are using raw format virtio
disks backed by a partition or LVM volume.
If you run guests by invoking /usr/libexec/qemu-kvm directly, use the
"-global virtio-blk-pci.scsi=off" option to apply the mitigation. If you
are using libvirt, as recommended by Red Hat, and have the RHBA-2012:0013
libvirt update installed, no manual action is required: guests will
automatically use "scsi=off". (BZ#767721)
Note: After installing the RHSA-2011:1849 kernel update, SCSI requests
issued by guests via the SG_IO IOCTL will not be passed to the underlying
block device when using raw format virtio disks backed by a partition or
LVM volume, even if "scsi=on" is used.
As well, this update adds the following enhancement:
* Prior to this update, qemu-kvm was not built with RELRO or PIE support.
qemu-kvm is now built with full RELRO and PIE support as a security
enhancement. (BZ#767906)
All users of qemu-kvm should upgrade to these updated packages, which
correct these issues and add this enhancement. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue, one bug, and add\none enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component\nfor running virtual machines using KVM.\n\nA heap overflow flaw was found in the way QEMU-KVM emulated the e1000\nnetwork interface card. A privileged guest user in a virtual machine whose\nnetwork interface is configured to use the e1000 emulated driver could use\nthis flaw to crash the host or, possibly, escalate their privileges on the\nhost. (CVE-2012-0029)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting this issue.\n\nThis update also fixes the following bug:\n\n* qemu-kvm has a \"scsi\" option, to be used, for example, with the\n\"-device\" option: \"-device virtio-blk-pci,drive=[drive name],scsi=off\".\nPreviously, however, it only masked the feature bit, and did not reject\nSCSI commands if a malicious guest ignored the feature bit and issued a\nrequest. This update corrects this issue. The \"scsi=off\" option can be\nused to mitigate the virtualization aspect of CVE-2011-4127 before the\nRHSA-2011:1849 kernel update is installed on the host.\n\nThis mitigation is only required if you do not have the RHSA-2011:1849\nkernel update installed on the host and you are using raw format virtio\ndisks backed by a partition or LVM volume.\n\nIf you run guests by invoking /usr/libexec/qemu-kvm directly, use the\n\"-global virtio-blk-pci.scsi=off\" option to apply the mitigation. If you\nare using libvirt, as recommended by Red Hat, and have the RHBA-2012:0013\nlibvirt update installed, no manual action is required: guests will\nautomatically use \"scsi=off\". (BZ#767721)\n\nNote: After installing the RHSA-2011:1849 kernel update, SCSI requests\nissued by guests via the SG_IO IOCTL will not be passed to the underlying\nblock device when using raw format virtio disks backed by a partition or\nLVM volume, even if \"scsi=on\" is used.\n\nAs well, this update adds the following enhancement:\n\n* Prior to this update, qemu-kvm was not built with RELRO or PIE support.\nqemu-kvm is now built with full RELRO and PIE support as a security\nenhancement. (BZ#767906)\n\nAll users of qemu-kvm should upgrade to these updated packages, which\ncorrect these issues and add this enhancement. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0050", "url": "https://access.redhat.com/errata/RHSA-2012:0050" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-67874", "url": "https://access.redhat.com/kb/docs/DOC-67874" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2011-1849.html", "url": "https://rhn.redhat.com/errata/RHSA-2011-1849.html" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2012-0013.html", "url": "https://rhn.redhat.com/errata/RHBA-2012-0013.html" }, { "category": "external", "summary": "772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0050.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:04:18+00:00", "generator": { "date": "2024-11-22T05:04:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0050", "initial_release_date": "2012-01-23T18:51:00+00:00", "revision_history": [ { "date": "2012-01-23T18:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-23T18:57:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:04:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.209.el6_2.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.209.el6_2.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.209.el6_2.4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.209.el6_2.4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "product_id": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.209.el6_2.4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "772075" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: e1000: process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "RHBZ#772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-23T18:51:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0050" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Client-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Client-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6ComputeNode-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6ComputeNode-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Server-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Server-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-img-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.src", "6Workstation-6.2.z:qemu-kvm-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-debuginfo-2:0.12.1.2-2.209.el6_2.4.x86_64", "6Workstation-6.2.z:qemu-kvm-tools-2:0.12.1.2-2.209.el6_2.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: e1000: process_tx_desc legacy mode packets heap overflow" } ] }
rhsa-2012_0370
Vulnerability from csaf_redhat
Published
2012-03-07 14:32
Modified
2024-11-22 05:04
Summary
Red Hat Security Advisory: xen security and bug fix update
Notes
Topic
Updated xen packages that fix one security issue and two bugs are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
A heap overflow flaw was found in the way QEMU emulated the e1000 network
interface card. A privileged guest user in a virtual machine whose network
interface is configured to use the e1000 emulated driver could use this
flaw to crash QEMU or, possibly, escalate their privileges on the host.
(CVE-2012-0029)
Red Hat would like to thank Nicolae Mogoreanu for reporting this issue.
This update also fixes the following bugs:
* Adding support for jumbo frames introduced incorrect network device
expansion when a bridge is created. The expansion worked correctly with the
default configuration, but could have caused network setup failures when a
user-defined network script was used. This update changes the expansion so
network setup will not fail, even when a user-defined network script is
used. (BZ#797191)
* A bug was found in xenconsoled, the Xen hypervisor console daemon. If
timestamp logging for this daemon was enabled (using both the
XENCONSOLED_TIMESTAMP_HYPERVISOR_LOG and XENCONSOLED_TIMESTAMP_GUEST_LOG
options in "/etc/sysconfig/xend"), xenconsoled could crash if the guest
emitted a lot of information to its serial console in a short period of
time. Eventually, the guest would freeze after the console buffer was
filled due to the crashed xenconsoled. Timestamp logging is disabled by
default. (BZ#797836)
All xen users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xen packages that fix one security issue and two bugs are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The xen packages contain administration tools and the xend service for\nmanaging the kernel-xen kernel for virtualization on Red Hat Enterprise\nLinux.\n\nA heap overflow flaw was found in the way QEMU emulated the e1000 network\ninterface card. A privileged guest user in a virtual machine whose network\ninterface is configured to use the e1000 emulated driver could use this\nflaw to crash QEMU or, possibly, escalate their privileges on the host.\n(CVE-2012-0029)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting this issue.\n\nThis update also fixes the following bugs:\n\n* Adding support for jumbo frames introduced incorrect network device\nexpansion when a bridge is created. The expansion worked correctly with the\ndefault configuration, but could have caused network setup failures when a\nuser-defined network script was used. This update changes the expansion so\nnetwork setup will not fail, even when a user-defined network script is\nused. (BZ#797191)\n\n* A bug was found in xenconsoled, the Xen hypervisor console daemon. If\ntimestamp logging for this daemon was enabled (using both the\nXENCONSOLED_TIMESTAMP_HYPERVISOR_LOG and XENCONSOLED_TIMESTAMP_GUEST_LOG\noptions in \"/etc/sysconfig/xend\"), xenconsoled could crash if the guest\nemitted a lot of information to its serial console in a short period of\ntime. Eventually, the guest would freeze after the console buffer was\nfilled due to the crashed xenconsoled. Timestamp logging is disabled by\ndefault. (BZ#797836)\n\nAll xen users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0370", "url": "https://access.redhat.com/errata/RHSA-2012:0370" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "797191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797191" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0370.json" } ], "title": "Red Hat Security Advisory: xen security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:04:45+00:00", "generator": { "date": "2024-11-22T05:04:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0370", "initial_release_date": "2012-03-07T14:32:00+00:00", "revision_history": [ { "date": "2012-03-07T14:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-03-07T14:35:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:04:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "product_id": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.2?arch=ia64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.2?arch=ia64" } } }, { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "product_id": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.2?arch=ia64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.2.ia64", "product": { "name": "xen-0:3.0.3-135.el5_8.2.ia64", "product_id": "xen-0:3.0.3-135.el5_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.2.i386", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.2.i386", "product_id": "xen-libs-0:3.0.3-135.el5_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.2?arch=i386" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.2?arch=i386" } } }, { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.2.i386", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.2.i386", "product_id": "xen-devel-0:3.0.3-135.el5_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.2?arch=i386" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.2.i386", "product": { "name": "xen-0:3.0.3-135.el5_8.2.i386", "product_id": "xen-0:3.0.3-135.el5_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "product_id": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "product_id": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.2.x86_64", "product": { "name": "xen-0:3.0.3-135.el5_8.2.x86_64", "product_id": "xen-0:3.0.3-135.el5_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.2.src", "product": { "name": "xen-0:3.0.3-135.el5_8.2.src", "product_id": "xen-0:3.0.3-135.el5_8.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.2.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.2.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "772075" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: e1000: process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "RHBZ#772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-03-07T14:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0370" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.2.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: e1000: process_tx_desc legacy mode packets heap overflow" } ] }
rhsa-2012_0109
Vulnerability from csaf_redhat
Published
2012-02-15 16:01
Modified
2024-11-22 05:29
Summary
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
Notes
Topic
An updated rhev-hypervisor6 package that fixes multiple security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
(CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
(CVE-2011-4619)
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2009-5029 and CVE-2011-4609 (glibc issues)
CVE-2012-0056 (kernel issue)
CVE-2011-4108 and CVE-2012-0050 (openssl issues)
This update also fixes the following bugs:
* Previously, it was possible to begin a Hypervisor installation without
any valid disks to install to.
Now, if no valid disks are found for Hypervisor installation, a message is
displayed informing the user that there are no valid disks for
installation. (BZ#781471)
* Previously, the user interface for the Hypervisor did not indicate
whether the system was registered with Red Hat Network (RHN) Classic or RHN
Satellite. As a result, customers could not easily determine the
registration status of their Hypervisor installations.
The TUI has been updated to display the registration status of the
Hypervisor. (BZ#788223)
* Previously, autoinstall would fail if the firstboot or reinstall options
were passed but local_boot or upgrade were not passed. Now, neither the
local_boot or upgrade parameters are required for autoinstall. (BZ#788225)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap overflow flaw was found in the way QEMU-KVM emulated the e1000\nnetwork interface card. A privileged guest user in a virtual machine whose\nnetwork interface is configured to use the e1000 emulated driver could use\nthis flaw to crash the host or, possibly, escalate their privileges on the\nhost. (CVE-2012-0029)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nA denial of service flaw was found in the RFC 3779 implementation in\nOpenSSL. A remote attacker could use this flaw to make an application using\nOpenSSL exit unexpectedly by providing a specially-crafted X.509\ncertificate that has malformed RFC 3779 extension data. (CVE-2011-4577)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2009-5029 and CVE-2011-4609 (glibc issues)\n\nCVE-2012-0056 (kernel issue)\n\nCVE-2011-4108 and CVE-2012-0050 (openssl issues)\n\nThis update also fixes the following bugs:\n\n* Previously, it was possible to begin a Hypervisor installation without\nany valid disks to install to.\n\nNow, if no valid disks are found for Hypervisor installation, a message is\ndisplayed informing the user that there are no valid disks for\ninstallation. (BZ#781471)\n\n* Previously, the user interface for the Hypervisor did not indicate\nwhether the system was registered with Red Hat Network (RHN) Classic or RHN\nSatellite. As a result, customers could not easily determine the\nregistration status of their Hypervisor installations.\n\nThe TUI has been updated to display the registration status of the\nHypervisor. (BZ#788223)\n\n* Previously, autoinstall would fail if the firstboot or reinstall options\nwere passed but local_boot or upgrade were not passed. Now, neither the\nlocal_boot or upgrade parameters are required for autoinstall. (BZ#788225)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0109", "url": "https://access.redhat.com/errata/RHSA-2012:0109" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Technical_Notes/", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Technical_Notes/" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771778" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "781472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=781472" }, { "category": "external", "summary": "788225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788225" }, { "category": "external", "summary": "788226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788226" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0109.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:29:03+00:00", "generator": { "date": "2024-11-22T05:29:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0109", "initial_release_date": "2012-02-15T16:01:00+00:00", "revision_history": [ { "date": "2012-02-15T16:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-15T16:09:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:29:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch", "product": { "name": "rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch", "product_id": "rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6-tools@6.2-20120209.0.el6_2?arch=noarch" } } }, { "category": "product_version", "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "product": { "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "product_id": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.2-20120209.0.el6_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "product": { "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "product_id": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.2-20120209.0.el6_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch" }, "product_reference": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.src as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src" }, "product_reference": "rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "relates_to_product_reference": "6Server-RHEV-Hypervisor" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" }, "product_reference": "rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-15T16:01:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0109" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4577", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771778" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: malformed RFC 3779 data can cause assertion failures", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4577" }, { "category": "external", "summary": "RHBZ#771778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4577", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4577" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-15T16:01:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0109" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: malformed RFC 3779 data can cause assertion failures" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-15T16:01:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0109" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" }, { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "772075" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: e1000: process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "RHBZ#772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-15T16:01:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0109" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.noarch", "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.2-20120209.0.el6_2.src", "6Server-RHEV-Hypervisor:rhev-hypervisor6-tools-0:6.2-20120209.0.el6_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: e1000: process_tx_desc legacy mode packets heap overflow" } ] }
rhsa-2012_0051
Vulnerability from csaf_redhat
Published
2012-01-23 18:53
Modified
2024-11-22 05:05
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
Updated kvm packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for
the standard Red Hat Enterprise Linux kernel.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
A flaw was found in the way the KVM subsystem of a Linux kernel handled PIT
(Programmable Interval Timer) IRQs (interrupt requests) when there was no
virtual interrupt controller set up. A malicious user in the kvm group on
the host could force this situation to occur, resulting in the host
crashing. (CVE-2011-4622)
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029.
All KVM users should upgrade to these updated packages, which contain
backported patches to correct these issues. Note: The procedure in the
Solution section must be performed before this update will take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for\nthe standard Red Hat Enterprise Linux kernel.\n\nA heap overflow flaw was found in the way QEMU-KVM emulated the e1000\nnetwork interface card. A privileged guest user in a virtual machine whose\nnetwork interface is configured to use the e1000 emulated driver could use\nthis flaw to crash the host or, possibly, escalate their privileges on the\nhost. (CVE-2012-0029)\n\nA flaw was found in the way the KVM subsystem of a Linux kernel handled PIT\n(Programmable Interval Timer) IRQs (interrupt requests) when there was no\nvirtual interrupt controller set up. A malicious user in the kvm group on\nthe host could force this situation to occur, resulting in the host\ncrashing. (CVE-2011-4622)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029.\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Note: The procedure in the\nSolution section must be performed before this update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0051", "url": "https://access.redhat.com/errata/RHSA-2012:0051" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "769721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721" }, { "category": "external", "summary": "772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0051.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T05:05:20+00:00", "generator": { "date": "2024-11-22T05:05:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0051", "initial_release_date": "2012-01-23T18:53:00+00:00", "revision_history": [ { "date": "2012-01-23T18:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-23T18:56:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:05:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kvm-tools-0:83-239.el5_7.1.x86_64", "product": { "name": "kvm-tools-0:83-239.el5_7.1.x86_64", "product_id": "kvm-tools-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-239.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-debuginfo-0:83-239.el5_7.1.x86_64", "product": { "name": "kvm-debuginfo-0:83-239.el5_7.1.x86_64", "product_id": "kvm-debuginfo-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-239.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-239.el5_7.1.x86_64", "product": { "name": "kvm-0:83-239.el5_7.1.x86_64", "product_id": "kvm-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-239.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-0:83-239.el5_7.1.x86_64", "product": { "name": "kmod-kvm-0:83-239.el5_7.1.x86_64", "product_id": "kmod-kvm-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-239.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "product": { "name": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "product_id": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-239.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-239.el5_7.1.x86_64", "product": { "name": "kvm-qemu-img-0:83-239.el5_7.1.x86_64", "product_id": "kvm-qemu-img-0:83-239.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-239.el5_7.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-239.el5_7.1.src", "product": { "name": "kvm-0:83-239.el5_7.1.src", "product_id": "kvm-0:83-239.el5_7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-239.el5_7.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64" }, "product_reference": "kmod-kvm-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-239.el5_7.1.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src" }, "product_reference": "kvm-0:83-239.el5_7.1.src", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-debuginfo-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-qemu-img-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-239.el5_7.1.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-tools-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Client-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64" }, "product_reference": "kmod-kvm-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-239.el5_7.1.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src" }, "product_reference": "kvm-0:83-239.el5_7.1.src", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-debuginfo-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-qemu-img-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-239.el5_7.1.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" }, "product_reference": "kvm-tools-0:83-239.el5_7.1.x86_64", "relates_to_product_reference": "5Server-VT-5.7.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4622", "discovery_date": "2011-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "769721" } ], "notes": [ { "category": "description", "text": "The create_pit_timer function in arch/x86/kvm/i8254.c in KVM 83, and possibly other versions, does not properly handle when Programmable Interval Timer (PIT) interrupt requests (IRQs) when a virtual interrupt controller (irqchip) is not available, which allows local users to cause a denial of service (NULL pointer dereference) by starting a timer.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: pit timer with no irqchip crashes the system", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and Red Hat Enterprise MRG as they did not provide support for the KVM subsystem. It has been addressed in Red Hat Enterprise 5 and 6 via https://rhn.redhat.com/errata/RHSA-2012-0051.html and https://rhn.redhat.com/errata/RHSA-2012-0350.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4622" }, { "category": "external", "summary": "RHBZ#769721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4622", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4622" } ], "release_date": "2011-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-23T18:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0051" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kvm: pit timer with no irqchip crashes the system" }, { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "772075" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: e1000: process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "RHBZ#772075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-23T18:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0051" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Client-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Client-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kmod-kvm-debug-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.src", "5Server-VT-5.7.Z:kvm-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-debuginfo-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-qemu-img-0:83-239.el5_7.1.x86_64", "5Server-VT-5.7.Z:kvm-tools-0:83-239.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: e1000: process_tx_desc legacy mode packets heap overflow" } ] }
rhsa-2012_0168
Vulnerability from csaf_redhat
Published
2012-02-21 04:52
Modified
2012-02-21 05:01
Summary
Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update
Notes
Topic
An updated rhev-hypervisor5 package that fixes several security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()
function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2012-0207)
A double free flaw was discovered in the policy checking code in OpenSSL.
A remote attacker could use this flaw to crash an application that uses
OpenSSL by providing an X.509 certificate that has specially-crafted
policy extension data. (CVE-2011-4109)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
(CVE-2011-4576)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
(CVE-2011-4619)
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,
and Simon McVittie for reporting CVE-2012-0207.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2006-1168 and CVE-2011-2716 (busybox issues)
CVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc
issues)
CVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and
CVE-2012-0028 (kernel issues)
CVE-2011-1526 (krb5 issue)
CVE-2011-4347 (kvm issue)
CVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
and CVE-2011-1944 (libxml2 issues)
CVE-2011-1749 (nfs-utils issue)
CVE-2011-4108 (openssl issue)
CVE-2011-0010 (sudo issue)
CVE-2011-1675 and CVE-2011-1677 (util-linux issues)
CVE-2010-0424 (vixie-cron issue)
This updated rhev-hypervisor5 package fixes various bugs. Documentation of
these changes will be available shortly in the Technical Notes document:
https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor5 package that fixes several security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization\nHypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.\nIt includes everything necessary to run and manage virtual machines: A\nsubset of the Red Hat Enterprise Linux operating environment and the Red\nHat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap overflow flaw was found in the way QEMU-KVM emulated the e1000\nnetwork interface card. A privileged guest user in a virtual machine whose\nnetwork interface is configured to use the e1000 emulated driver could use\nthis flaw to crash the host or, possibly, escalate their privileges on the\nhost. (CVE-2012-0029)\n\nA divide-by-zero flaw was found in the Linux kernel\u0027s igmp_heard_query()\nfunction. An attacker able to send certain IGMP (Internet Group Management\nProtocol) packets to a target system could use this flaw to cause a denial\nof service. (CVE-2012-0207)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,\nand Simon McVittie for reporting CVE-2012-0207.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2006-1168 and CVE-2011-2716 (busybox issues)\n\nCVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc\nissues)\n\nCVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and\nCVE-2012-0028 (kernel issues)\n\nCVE-2011-1526 (krb5 issue)\n\nCVE-2011-4347 (kvm issue)\n\nCVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919\nand CVE-2011-1944 (libxml2 issues)\n\nCVE-2011-1749 (nfs-utils issue)\n\nCVE-2011-4108 (openssl issue)\n\nCVE-2011-0010 (sudo issue)\n\nCVE-2011-1675 and CVE-2011-1677 (util-linux issues)\n\nCVE-2010-0424 (vixie-cron issue)\n\nThis updated rhev-hypervisor5 package fixes various bugs. Documentation of\nthese changes will be available shortly in the Technical Notes document:\n\nhttps://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0168", "url": "https://access.redhat.com/errata/RHSA-2012:0168" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html", "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2012/rhsa-2012_0168.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update", "tracking": { "current_release_date": "2012-02-21T05:01:00Z", "generator": { "date": "2023-06-30T20:28:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2012:0168", "initial_release_date": "2012-02-21T04:52:00Z", "revision_history": [ { "date": "2012-02-21T05:01:00Z", "number": "2", "summary": "Current version" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Red Hat Virtualization", "product": { "name": "Red Hat Virtualization", "product_id": "Red Hat Virtualization" } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" }, { "category": "external", "summary": "CVE-2011-4109", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "bz#771771: CVE-2011-4109 openssl: double-free in policy checks", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4109 openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" }, { "category": "external", "summary": "CVE-2011-4576", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "bz#771775: CVE-2011-4576 openssl: uninitialized SSL 3.0 padding", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4576 openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" }, { "category": "external", "summary": "CVE-2011-4619", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "bz#771780: CVE-2011-4619 openssl: SGC restart DoS attack", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4619 openssl: SGC restart DoS attack" }, { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" }, { "category": "external", "summary": "CVE-2012-0029", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "bz#772075: process_tx_desc legacy mode packets heap overflow", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" } ], "release_date": "2012-01-23T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "COMPLETE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-05T00:00:00Z", "details": "Important" } ], "title": "process_tx_desc legacy mode packets heap overflow" }, { "acknowledgments": [ { "names": [ "Simon McVittie" ] } ], "cve": "CVE-2012-0207", "discovery_date": "2012-01-10T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=772867" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "Avoid zero delay when receiving odd mixture of IGMP queries", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0207", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0207" }, { "category": "external", "summary": "CVE-2012-0207", "url": "https://access.redhat.com/security/cve/CVE-2012-0207" }, { "category": "external", "summary": "bz#772867: Avoid zero delay when receiving odd mixture of IGMP queries", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772867" } ], "release_date": "2012-01-10T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.1, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-10T00:00:00Z", "details": "Moderate" } ], "title": "Avoid zero delay when receiving odd mixture of IGMP queries" } ] }
gsd-2012-0029
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-0029", "description": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "id": "GSD-2012-0029", "references": [ "https://www.suse.com/security/cve/CVE-2012-0029.html", "https://www.debian.org/security/2012/dsa-2404", "https://www.debian.org/security/2012/dsa-2396", "https://access.redhat.com/errata/RHSA-2012:0370", "https://access.redhat.com/errata/RHSA-2012:0168", "https://access.redhat.com/errata/RHSA-2012:0109", "https://access.redhat.com/errata/RHSA-2012:0051", "https://access.redhat.com/errata/RHSA-2012:0050", "https://linux.oracle.com/cve/CVE-2012-0029.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-0029" ], "details": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "id": "GSD-2012-0029", "modified": "2023-12-13T01:20:13.604643Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "http://secunia.com/advisories/50913", "refsource": "MISC", "url": "http://secunia.com/advisories/50913" }, { "name": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" }, { "name": "http://secunia.com/advisories/47992", "refsource": "MISC", "url": "http://secunia.com/advisories/47992" }, { "name": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0", "refsource": "MISC", "url": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-0370.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-0370.html" }, { "name": "http://secunia.com/advisories/47740", "refsource": "MISC", "url": "http://secunia.com/advisories/47740" }, { "name": "http://secunia.com/advisories/47741", "refsource": "MISC", "url": "http://secunia.com/advisories/47741" }, { "name": "http://secunia.com/advisories/48318", "refsource": "MISC", "url": "http://secunia.com/advisories/48318" }, { "name": "http://www.redhat.com/support/errata/RHSA-2012-0050.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2012-0050.html" }, { "name": "http://www.securityfocus.com/bid/51642", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/51642" }, { "name": "http://www.ubuntu.com/usn/USN-1339-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1339-1" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=772075", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kvm_group:qemu-kvm:0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-0029" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "47740", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47740" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=772075", "refsource": "MISC", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" }, { "name": "RHSA-2012:0050", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2012-0050.html" }, { "name": "47741", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47741" }, { "name": "51642", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/51642" }, { "name": "USN-1339-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1339-1" }, { "name": "FEDORA-2012-8604", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html" }, { "name": "openSUSE-SU-2012:0207", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" }, { "name": "47992", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/47992" }, { "name": "48318", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48318" }, { "name": "RHSA-2012:0370", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0370.html" }, { "name": "SUSE-SU-2012:1320", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "50913", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/50913" }, { "name": "qemu-processtxdesc-bo(72656)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72656" }, { "name": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0", "refsource": "MISC", "tags": [], "url": "http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:22Z", "publishedDate": "2012-01-27T15:55Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.