Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:30782
HistoryJun 02, 2014 - 12:00 a.m.

[ MDVSA-2014:097 ] libvirt

2014-06-0200:00:00
vulners.com
27

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2014:097
http://www.mandriva.com/en/support/security/


Package : libvirt
Date : May 16, 2014
Affected: Business Server 1.0


Problem Description:

Multiple vulnerabilities has been discovered and corrected in libvirt:

The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through
1.2.1 allows local users to (1) delete arbitrary host devices
via the virDomainDeviceDettach API and a symlink attack on /dev
in the container; (2) create arbitrary nodes (mknod) via the
virDomainDeviceAttach API and a symlink attack on /dev in the
container; and cause a denial of service (shutdown or reboot host
OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a
symlink attack on /dev/initctl in the container, related to paths under
/proc//root and the virInitctlSetRunLevel function (CVE-2013-6456).

libvirt was patched to prevent expansion of entities when parsing XML
files. This vulnerability allowed malicious users to read arbitrary
files or cause a denial of service (CVE-2014-0179).

The updated packages have been upgraded to the 1.1.3.5 version and
patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179
http://security.libvirt.org/2014/0003.html
http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html


Updated Packages:

Mandriva Business Server 1/X86_64:
d32a9d1b0e2f0d41fd38ca91678a14bd mbs1/x86_64/lib64virt0-1.1.3.5-1.mbs1.x86_64.rpm
e808eb120fe42eba162c3be07bde1d60 mbs1/x86_64/lib64virt-devel-1.1.3.5-1.mbs1.x86_64.rpm
5957f991a7942b196a6754430c75e77c mbs1/x86_64/libvirt-utils-1.1.3.5-1.mbs1.x86_64.rpm
0787c1c3f963848334500deb9a4e8416 mbs1/x86_64/python-libvirt-1.1.3.5-1.mbs1.x86_64.rpm
1abef0303ae5d38c128a96cba3e7c589 mbs1/SRPMS/libvirt-1.1.3.5-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTdelbmqjQ0CJFipgRAu7JAKCw9pUcJ0Ex3y4wHSVbqh6JXOPQ6gCgstCy
jzarMyA06kq7pPYrm9T0a08=
=12bW
-----END PGP SIGNATURE-----