Bug 1088290 (CVE-2014-0179, CVE-2014-5177)
Summary: | CVE-2014-0179 CVE-2014-5177 libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aavati, acathrow, berrange, bsarathy, eblake, jdenemar, jkurik, jrusnack, nlevinki, pfrields, rfortier, rjones, scorneli, security-response-team, ssaha, vbellur, veillard |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was found that libvirt passes the XML_PARSE_NOENT flag when parsing XML documents using the libxml2 library, in which case all XML entities in the parsed documents are expanded. A user able to force libvirtd to parse an XML document with an entity pointing to a file could use this flaw to read the contents of that file (limited to libvirt as shipped with Red Hat Enterprise Linux 7); parsing an XML document with an entity pointing to a special file that blocks on read access could cause libvirtd to hang indefinitely, resulting in a denial of service on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-07-22 19:43:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1088292, 1088293, 1094790, 1094791, 1094792 | ||
Bug Blocks: | 1086699, 1088308, 1097799, 1121180 |
Description
Petr Matousek
2014-04-16 11:35:42 UTC
Public announcement https://www.redhat.com/archives/libvir-list/2014-May/msg00209.html Created libvirt tracking bugs for this issue: Affects: fedora-all [bug 1094792] libvirt-1.1.3.5-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. External References: http://security.libvirt.org/2014/0003.html Statement: This issue affects the versions of libvirt as shipped with Red Hat Enterprise Linux 5, however the impact is limited to denial of service since it does not support fine grained access control. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Acknowledgements: Red Hat would like to thank the upstream Libvirt project for reporting this issue. Upstream acknowledges Daniel P. Berrange and Richard Jones as the original reporters. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0560 https://rhn.redhat.com/errata/RHSA-2014-0560.html IssueDescription CVE-2014-5177: It was found that libvirt passes the XML_PARSE_NOENT flag when parsing XML documents using the libxml2 library, in which case all XML entities in the parsed documents are expanded. A user able to force libvirtd to parse an XML document with an entity pointing to a file could use this flaw to read the contents of that file. Note that this issue is limited to libvirt as shipped with Red Hat Enterprise Linux 7. IssueDescription CVE-2014-0179: It was found that libvirt passes the XML_PARSE_NOENT flag when parsing XML documents using the libxml2 library, in which case all XML entities in the parsed documents are expanded. A user able to force libvirtd to parse an XML document with an entity pointing to a file could use this flaw to read the contents of that file; parsing an XML document with an entity pointing to a special file that blocks on read access could cause libvirtd to hang indefinitely, resulting in a denial of service on the system. This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0914 https://rhn.redhat.com/errata/RHSA-2014-0914.html |