How to Buy
This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
libvirt invokes the PolicyKit pkcheck utility to handle authorization.
A race condition was found in the way libvirt used this utility,
allowing a local user to bypass intended PolicyKit authorizations or
execute arbitrary commands with root privileges. (CVE-2013-4311)
Note: With this update, libvirt has been rebuilt to communicate with
PolicyKit via a different API that is not vulnerable to the race
condition. The polkit SLSA-2013:1270 advisory must also be installed
to fix the CVE-2013-4311 issue.
An invalid free flaw was found in libvirtd's
remoteDispatchDomainMemoryStats function. An attacker able to
establish a read-only connection to libvirtd could use this flaw to
crash libvirtd. (CVE-2013-4296)
This update also fixes the following bugs :
- Prior to this update, the libvirtd daemon leaked memory
in the virCgroupMoveTask() function. A fix has been
provided which prevents libvirtd from incorrect
management of memory allocations.
- Previously, the libvirtd daemon was accessing one byte
before the array in the virCgroupGetValueStr() function.
This bug has been fixed and libvirtd now stays within
the array bounds.
- When migrating, libvirtd leaked the migration URI
(Uniform Resource Identifier) on destination. A patch
has been provided to fix this bug and the migration URI
is now freed correctly.
- Updating a network interface using
virDomainUpdateDeviceFlags API failed when a boot order
was set for that interface. The update failed even if
the boot order was set in the provided device XML. The
virDomainUpdateDeviceFlags API has been fixed to
correctly parse the boot order specification from the
provided device XML and updating network interfaces with
boot orders now works as expected.
After installing the updated packages, libvirtd will be restarted
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.6
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 70015 ()
CVE ID: CVE-2013-4296CVE-2013-4311
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.