Bug 1145667 (CVE-2014-3657)
Summary: | CVE-2014-3657 libvirt: domain_conf: domain deadlock DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aavati, ajia, berrange, chazlett, dyuan, eblake, hannsj_uhl, jdenemar, mzhan, nlevinki, phrdina, pkrempa, rbalakri, rfortier, security-response-team, shaines, sisharma, smohan, ssaha, vbellur, virt-bugs |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A denial of service flaw was found in the way libvirt's virConnectListAllDomains() function computed the number of used domains. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to make any domain operations within libvirt unresponsive.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-11-18 21:49:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1145669, 1145670, 1145671, 1160277, 1160824 | ||
Bug Blocks: | 1143903, 1145679, 1160286 |
Description
Petr Matousek
2014-09-23 13:17:07 UTC
Statement: This issue does not affect the versions of libvirt packages as shipped with Red Hat Enterprise Linux 5. This issue does affect the versions of libvirt packages as shipped with Red Hat Enterprise Linux 6 and 7. Future updates may address this issue in the respective Red Hat Enterprise Linux releases. IssueDescription: A denial of service flaw was found in the way libvirt's virConnectListAllDomains() function computed the number of used domains. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to make any domain operations within libvirt unresponsive. Upstream commit: http://libvirt.org/git/?p=libvirt.git;a=commit;h=fc22b2e74890873848b43fffae43025d22053669 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1352 https://rhn.redhat.com/errata/RHSA-2014-1352.html Created libvirt tracking bugs for this issue: Affects: fedora-all [bug 1160824] This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1873 https://rhn.redhat.com/errata/RHSA-2014-1873.html libvirt-1.1.3.8-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. |