Bug 1002666 (CVE-2013-4292) - CVE-2013-4292 libvirt: unbounded RPC arrays in remote protocol
Summary: CVE-2013-4292 libvirt: unbounded RPC arrays in remote protocol
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-4292
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1002667
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-08-29 17:05 UTC by Vincent Danen
Modified: 2021-02-17 07:22 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-08-29 17:07:28 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2013-08-29 17:05:43 UTC
It was reported [1] that the parameters for the virDomainMigrate*Params RPC calls were not bounds checked, which meant that a malicious client could cause libvirtd to consume arbitrary memory.  This issue was introduced in libvirt 1.1.0 and has been corrected in git.

[1] http://www.mail-archive.com/libvir-list@redhat.com/msg83332.html


Statement:

Not vulnerable. This issue did not affect the versions of libvirt as shipped with Red Hat Enterprise Linux 5 and 6 as they did not ship the vulnerable version.


Note You need to log in before you can comment on or make changes to this bug.