Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Mar 2014 11:39:08 +0100
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: libvirt-security@...hat.com, Eric Blake <eblake@...hat.com>,
        Daniel Berrange <berrange@...hat.com>
Subject: CVE request -- libvirt: unprivileged user can crash libvirtd during
 spice migration

(this issue was reported to libvirt-security mailing list in the year
2k13 so might need 2k13 CVE)

Description of the problem:

Domblkstat is possible even with read-only connection, so whenever
migration with spice is done and domblkstat gets called at the same time
as qemuMonitorGetSpiceMigrationStatus(), there is certain possibility
that the daemon crashes (null pointer dereference).

An unprivileged user able to issue commands to running libvirtd could
use this flaw to crash libvirtd and prevent more privileged clients
from working correctly.

Upstream fix:
http://libvirt.org/git/?p=libvirt.git;a=commit;h=484cc321

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ