A double-free flaw was found in the way Libguestfs, a library for accessing and modifying guest disk images, performed scan of certain guest files / images. A remote attacker could provide a specially-crafted guest file that, when inspected in an application linked against Libguestfs would lead to that application abort (denial of service).
Relevant upstream patch (including reproducer):
This issue did NOT affect the version of the libguestfs package, as shipped with Red Hat Enterprise Linux 6.
This issue did NOT affect the version of the libguestfs package, as shipped with Fedora release of 17.
This issue (previously) affected the version of the libguestfs package, as shipped with Fedora release of 18. Version libguestfs-1.20.7-1.fc18 has been released (into the -testing branch) already to correct this problem.
This issue affects the version of the libguestfs package, as shipped with Fedora EPEL-5. Please schedule an update.
Created libguestfs tracking bugs for this issue
Affects: epel-5 [bug 968315]
Not vulnerable. This issue did not affect the version of libguestfs as shipped with Red Hat Enterprise Linux 6 as it did not include the upstream commit 5a3da366268825b26b470cde35658b67c1d11cd4 that introduced this issue.
Fedora 17 is not affected.
Fedora 18 is affected, fixed in this package:
Fedora 19 is affected, fixed in this package:
RHEL 6.4 is not affected.
RHEL 6.5 is going to be rebased (bug 958183) but we've not been
able to commit that yet because we're waiting for some acks. Will
clone this bug to make sure the fix isn't forgotten.
RHEL 7 would be affected, but we are planning to rebase
to 1.22.x (x >= 1) soon anyway. Will clone the bug for RHEL 7.
This has been assigned CVE-2013-2124 as per:
Further commits required:
Still working on this ...
OK I think we're all done upstream. The complete fix
requires the following commits:
It will be fixed upstream in >= 1.20.8, >= 1.22.2,