![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870845 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for libvirt RHSA-2012:1359-01 |
Resumen: | The remote host is missing an update for the 'libvirt'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'libvirt' package(s) announced via the referenced advisory. Vulnerability Insight: The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. A flaw was found in libvirtd's RPC call handling. An attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd by sending an RPC message that has an event as the RPC number, or an RPC number that falls into a gap in the RPC dispatch table. (CVE-2012-4423) This issue was discovered by Wenlong Huang of the Red Hat Virtualization QE Team. This update also fixes the following bugs: * When the host_uuid option was present in the libvirtd.conf file, the augeas libvirt lens was unable to parse the file. This bug has been fixed and the augeas libvirt lens now parses libvirtd.conf as expected in the described scenario. (BZ#858988) * When a virtual machine was started with an image chain using block devices and a block rebase operation was issued, the operation failed on completion in the blockJobAbort() function. This update relabels and configures cgroups for the backing files and the rebase operation now succeeds. (BZ#860720) All users of libvirt are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically. Affected Software/OS: libvirt on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4423 1027649 http://www.securitytracker.com/id?1027649 55541 http://www.securityfocus.com/bid/55541 FEDORA-2012-15634 http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089976.html FEDORA-2012-15640 http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090121.html RHSA-2012:1359 http://rhn.redhat.com/errata/RHSA-2012-1359.html USN-1708-1 http://www.ubuntu.com/usn/USN-1708-1 [libvirt] 20120912 [PATCH] Fix libvirtd crash possibility https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html [oss-security] 20120913 Re: CVE Request -- libvirt: null function pointer invocation in virNetServerProgramDispatchCall() http://www.openwall.com/lists/oss-security/2012/09/13/14 http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=b7ff9e696063189a715802d081d55a398663c15a http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f8fbeb50d52520a109d71c8566fed2ea600650ec https://bugzilla.redhat.com/show_bug.cgi?id=857133 openSUSE-SU-2013:0274 http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |