Scientific Linux Security Update : libvirt on SL6.x i386/x86_64

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

libvirt invokes the PolicyKit pkcheck utility to handle authorization.
A race condition was found in the way libvirt used this utility,
allowing a local user to bypass intended PolicyKit authorizations or
execute arbitrary commands with root privileges. (CVE-2013-4311)

Note: With this update, libvirt has been rebuilt to communicate with
PolicyKit via a different API that is not vulnerable to the race
condition. The polkit SLSA-2013:1270 advisory must also be installed
to fix the CVE-2013-4311 issue.

An invalid free flaw was found in libvirtd's
remoteDispatchDomainMemoryStats function. An attacker able to
establish a read-only connection to libvirtd could use this flaw to
crash libvirtd. (CVE-2013-4296)

This update also fixes the following bugs :

- Prior to this update, the libvirtd daemon leaked memory
in the virCgroupMoveTask() function. A fix has been
provided which prevents libvirtd from incorrect
management of memory allocations.

- Previously, the libvirtd daemon was accessing one byte
before the array in the virCgroupGetValueStr() function.
This bug has been fixed and libvirtd now stays within
the array bounds.

- When migrating, libvirtd leaked the migration URI
(Uniform Resource Identifier) on destination. A patch
has been provided to fix this bug and the migration URI
is now freed correctly.

- Updating a network interface using
virDomainUpdateDeviceFlags API failed when a boot order
was set for that interface. The update failed even if
the boot order was set in the provided device XML. The
virDomainUpdateDeviceFlags API has been fixed to
correctly parse the boot order specification from the
provided device XML and updating network interfaces with
boot orders now works as expected.

After installing the updated packages, libvirtd will be restarted

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 70015 ()

Bugtraq ID:

CVE ID: CVE-2013-4296

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now