Scientific Linux Security Update : libvirt on SL6.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remote management of virtualized
systems.

A flaw was found in libvirtd's RPC call handling. An attacker able to
establish a read-only connection to libvirtd could use this flaw to
crash libvirtd by sending an RPC message that has an event as the RPC
number, or an RPC number that falls into a gap in the RPC dispatch
table. (CVE-2012-4423)

This update also fixes the following bugs :

- When the host_uuid option was present in the
libvirtd.conf file, the augeas libvirt lens was unable
to parse the file. This bug has been fixed and the
augeas libvirt lens now parses libvirtd.conf as expected
in the described scenario.

- Disk hot plug is a two-part action: the
qemuMonitorAddDrive() call is followed by the
qemuMonitorAddDevice() call. When the first part
succeeded but the second one failed, libvirt failed to
roll back the first part and the device remained in use
even though the disk hot plug failed. With this update,
the rollback for the drive addition is properly
performed in the described scenario and disk hot plug
now works as expected.

- When a virtual machine was started with an image chain
using block devices and a block rebase operation was
issued, the operation failed on completion in the
blockJobAbort() function. This update relabels and
configures cgroups for the backing files and the rebase
operation now succeeds.

After installing the updated packages, libvirtd will be restarted
automatically.

See also :

http://www.nessus.org/u?1c57d55e

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 62506 ()

Bugtraq ID:

CVE ID: CVE-2012-4423