![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.881866 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for libvirt CESA-2014:0103 centos6 |
Resumen: | The remote host is missing an update for the 'libvirt'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'libvirt' package(s) announced via the referenced advisory. Vulnerability Insight: The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. A use-after-free flaw was found in the way several libvirt block APIs handled domain jobs. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, execute arbitrary code with the privileges of the libvirtd process (usually root). (CVE-2013-6458) A race condition was found in the way libvirtd handled keepalive initialization requests when the connection was closed prior to establishing connection credentials. An attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd, resulting in a denial of service. (CVE-2014-1447) This update also fixes the following bug: * A race condition was possible between a thread starting a virtual machine with a guest agent configured (regular start-up or while migrating) and a thread that was killing the VM process (or the process crashing). The race could cause the monitor object to be freed by the thread that killed the VM process, which was later accessed by the thread that was attempting to start the VM, resulting in a crash. This issue was fixed by checking the state of the VM after the attempted connection to the guest agent if the VM in the meantime exited, no other operations are attempted. (BZ#1055578) All libvirt users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically. Affected Software/OS: libvirt on CentOS 6 Solution: Please install the updated packages. CVSS Score: 6.8 CVSS Vector: AV:A/AC:H/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6458 56186 http://secunia.com/advisories/56186 56446 http://secunia.com/advisories/56446 60895 http://secunia.com/advisories/60895 DSA-2846 http://www.debian.org/security/2014/dsa-2846 GLSA-201412-04 http://security.gentoo.org/glsa/glsa-201412-04.xml RHSA-2014:0103 http://rhn.redhat.com/errata/RHSA-2014-0103.html USN-2093-1 http://www.ubuntu.com/usn/USN-2093-1 http://libvirt.org/news.html https://bugzilla.redhat.com/show_bug.cgi?id=1043069 openSUSE-SU-2014:0268 http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html openSUSE-SU-2014:0270 http://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html Common Vulnerability Exposure (CVE) ID: CVE-2014-1447 Debian Security Information: DSA-2846 (Google Search) RedHat Security Advisories: RHSA-2014:0103 http://www.securitytracker.com/id/1029695 http://secunia.com/advisories/56321 SuSE Security Announcement: openSUSE-SU-2014:0268 (Google Search) SuSE Security Announcement: openSUSE-SU-2014:0270 (Google Search) |
Copyright | Copyright (C) 2014 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |