Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69506
Category:Fedora Local Security Checks
Title:Fedora Core 13 FEDORA-2011-4870 (libvirt)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to libvirt
announced via advisory FEDORA-2011-4870.

Update Information:

Fix for CVE-2011-1486, error reporting in libvirtd is not thread safe
Fix specfile to create /var/lib/libvirt with proper permissions.
fix a lack of API check on read-only connections
this build fix one crash in the the error handling
fix a lack of API check on read-only connections

References:

[ 1 ] Bug #693391 - CVE-2011-1486 libvirt: error reporting in libvirtd is not thread safe
https://bugzilla.redhat.com/show_bug.cgi?id=693391
[ 2 ] Bug #683650 - CVE-2011-1146 libvirt: several API calls do not honour read-only connection
https://bugzilla.redhat.com/show_bug.cgi?id=683650

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update libvirt' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-4870

Risk factor : High

CVSS Score:
6.9

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1486
1025477
http://securitytracker.com/id?1025477
44459
http://secunia.com/advisories/44459
47148
http://www.securityfocus.com/bid/47148
DSA-2280
http://www.debian.org/security/2011/dsa-2280
RHSA-2011:0478
http://www.redhat.com/support/errata/RHSA-2011-0478.html
RHSA-2011:0479
http://www.redhat.com/support/errata/RHSA-2011-0479.html
USN-1152-1
http://www.ubuntu.com/usn/USN-1152-1
[libvirt] 20110323 [PATCH] Make error reporting in libvirtd thread safe
https://www.redhat.com/archives/libvir-list/2011-March/msg01087.html
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f44bfb7fb978c9313ce050a1c4149bf04aa0a670
http://support.avaya.com/css/P8/documents/100134583
https://bugzilla.redhat.com/show_bug.cgi?id=693391
Common Vulnerability Exposure (CVE) ID: CVE-2011-1146
1025262
http://www.securitytracker.com/id?1025262
43670
http://secunia.com/advisories/43670
43780
http://secunia.com/advisories/43780
43897
http://secunia.com/advisories/43897
43917
http://secunia.com/advisories/43917
44069
http://secunia.com/advisories/44069
46820
http://www.securityfocus.com/bid/46820
ADV-2011-0694
http://www.vupen.com/english/advisories/2011/0694
ADV-2011-0700
http://www.vupen.com/english/advisories/2011/0700
ADV-2011-0794
http://www.vupen.com/english/advisories/2011/0794
ADV-2011-0805
http://www.vupen.com/english/advisories/2011/0805
DSA-2194
http://www.debian.org/security/2011/dsa-2194
FEDORA-2011-3286
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html
RHSA-2011:0391
http://www.redhat.com/support/errata/RHSA-2011-0391.html
USN-1094-1
http://www.ubuntu.com/usn/USN-1094-1
[oss-security] 20110309 CVE request: libvirt: several API calls do not honour read-only connection
http://openwall.com/lists/oss-security/2011/03/09/3
[oss-security] 20110310 Re: CVE request: libvirt: several API calls do not honour read-only connection
http://openwall.com/lists/oss-security/2011/03/10/5
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3
https://bugzilla.novell.com/show_bug.cgi?id=678406
https://bugzilla.redhat.com/show_bug.cgi?id=683650
libvirt-apicalls-dos(66012)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66012
openSUSE-SU-2011:0311
http://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.