rhsa-2012_0168
Vulnerability from csaf_redhat
Published
2012-02-21 04:52
Modified
2012-02-21 05:01
Summary
Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update
Notes
Topic
An updated rhev-hypervisor5 package that fixes several security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
host. (CVE-2012-0029)
A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()
function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2012-0207)
A double free flaw was discovered in the policy checking code in OpenSSL.
A remote attacker could use this flaw to crash an application that uses
OpenSSL by providing an X.509 certificate that has specially-crafted
policy extension data. (CVE-2011-4109)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
(CVE-2011-4576)
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
(CVE-2011-4619)
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,
and Simon McVittie for reporting CVE-2012-0207.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2006-1168 and CVE-2011-2716 (busybox issues)
CVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc
issues)
CVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and
CVE-2012-0028 (kernel issues)
CVE-2011-1526 (krb5 issue)
CVE-2011-4347 (kvm issue)
CVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
and CVE-2011-1944 (libxml2 issues)
CVE-2011-1749 (nfs-utils issue)
CVE-2011-4108 (openssl issue)
CVE-2011-0010 (sudo issue)
CVE-2011-1675 and CVE-2011-1677 (util-linux issues)
CVE-2010-0424 (vixie-cron issue)
This updated rhev-hypervisor5 package fixes various bugs. Documentation of
these changes will be available shortly in the Technical Notes document:
https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor5 package that fixes several security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization\nHypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.\nIt includes everything necessary to run and manage virtual machines: A\nsubset of the Red Hat Enterprise Linux operating environment and the Red\nHat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap overflow flaw was found in the way QEMU-KVM emulated the e1000\nnetwork interface card. A privileged guest user in a virtual machine whose\nnetwork interface is configured to use the e1000 emulated driver could use\nthis flaw to crash the host or, possibly, escalate their privileges on the\nhost. (CVE-2012-0029)\n\nA divide-by-zero flaw was found in the Linux kernel\u0027s igmp_heard_query()\nfunction. An attacker able to send certain IGMP (Internet Group Management\nProtocol) packets to a target system could use this flaw to cause a denial\nof service. (CVE-2012-0207)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nRed Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,\nand Simon McVittie for reporting CVE-2012-0207.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2006-1168 and CVE-2011-2716 (busybox issues)\n\nCVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc\nissues)\n\nCVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and\nCVE-2012-0028 (kernel issues)\n\nCVE-2011-1526 (krb5 issue)\n\nCVE-2011-4347 (kvm issue)\n\nCVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919\nand CVE-2011-1944 (libxml2 issues)\n\nCVE-2011-1749 (nfs-utils issue)\n\nCVE-2011-4108 (openssl issue)\n\nCVE-2011-0010 (sudo issue)\n\nCVE-2011-1675 and CVE-2011-1677 (util-linux issues)\n\nCVE-2010-0424 (vixie-cron issue)\n\nThis updated rhev-hypervisor5 package fixes various bugs. Documentation of\nthese changes will be available shortly in the Technical Notes document:\n\nhttps://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0168", "url": "https://access.redhat.com/errata/RHSA-2012:0168" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html", "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2012/rhsa-2012_0168.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update", "tracking": { "current_release_date": "2012-02-21T05:01:00Z", "generator": { "date": "2023-06-30T20:28:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2012:0168", "initial_release_date": "2012-02-21T04:52:00Z", "revision_history": [ { "date": "2012-02-21T05:01:00Z", "number": "2", "summary": "Current version" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Red Hat Virtualization", "product": { "name": "Red Hat Virtualization", "product_id": "Red Hat Virtualization" } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" }, { "category": "external", "summary": "CVE-2011-4109", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "bz#771771: CVE-2011-4109 openssl: double-free in policy checks", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4109 openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" }, { "category": "external", "summary": "CVE-2011-4576", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "bz#771775: CVE-2011-4576 openssl: uninitialized SSL 3.0 padding", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4576 openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" }, { "category": "external", "summary": "CVE-2011-4619", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "bz#771780: CVE-2011-4619 openssl: SGC restart DoS attack", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" } ], "release_date": "2012-01-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2011-4619 openssl: SGC restart DoS attack" }, { "acknowledgments": [ { "names": [ "Nicolae Mogoreanu" ] } ], "cve": "CVE-2012-0029", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-01-05T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "process_tx_desc legacy mode packets heap overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0029", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0029" }, { "category": "external", "summary": "CVE-2012-0029", "url": "https://access.redhat.com/security/cve/CVE-2012-0029" }, { "category": "external", "summary": "bz#772075: process_tx_desc legacy mode packets heap overflow", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772075" } ], "release_date": "2012-01-23T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "COMPLETE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-05T00:00:00Z", "details": "Important" } ], "title": "process_tx_desc legacy mode packets heap overflow" }, { "acknowledgments": [ { "names": [ "Simon McVittie" ] } ], "cve": "CVE-2012-0207", "discovery_date": "2012-01-10T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=772867" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.", "title": "Vulnerability description" }, { "category": "summary", "text": "Avoid zero delay when receiving odd mixture of IGMP queries", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0207", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0207" }, { "category": "external", "summary": "CVE-2012-0207", "url": "https://access.redhat.com/security/cve/CVE-2012-0207" }, { "category": "external", "summary": "bz#772867: Avoid zero delay when receiving odd mixture of IGMP queries", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772867" } ], "release_date": "2012-01-10T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:0168" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.1, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-01-10T00:00:00Z", "details": "Moderate" } ], "title": "Avoid zero delay when receiving odd mixture of IGMP queries" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.