CVE-2014-8131
https://notcve.org/view.php?id=CVE-2014-8131
The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access. La implementación qemu de virConnectGetAllDomainStats en libvirt anterior a 1.2.11 no maneja correctamente los bloqueos cuando se salta un dominio debido a las restricciones ACL, lo que permite a usuarios remotos autenticados causar una denegación de servicio (bloqueo o fallo de segmentación y caída) a través de una solicitud de acceso cuando el usuario no tiene los privilegios de acceso. • http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html http://security.libvirt.org/2014/0008.html • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-8136 – libvirt: local denial of service in qemu/qemu_driver.c
https://notcve.org/view.php?id=CVE-2014-8136
The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors. Las funciones (1) qemuDomainMigratePerform y (2) qemuDomainMigrateFinish2 en qemu/qemu_driver.c en libvirt no desbloquea el dominio cuando una comprobación de ACL falla, lo que permite a usuarios locales provocar una denegación de servicio a través de vectores sin especificar. It was found that QEMU's qemuDomainMigratePerform() and qemuDomainMigrateFinish2() functions did not correctly perform a domain unlock on a failed ACL check. A remote attacker able to establish a connection to libvirtd could use this flaw to lock a domain of a more privileged user, causing a denial of service. • http://advisories.mageia.org/MGASA-2015-0002.html http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html http://rhn.redhat.com/errata/RHSA-2015-0323.html http://secunia.com/advisories/61111 http://www.mandriva.com/security/advisories?name=MDVSA-2015:023 http://www.mandriva.com/security/advisories?name=MDVSA-2015:070 http:// • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-8135
https://notcve.org/view.php?id=CVE-2014-8135
The storageVolUpload function in storage/storage_driver.c in libvirt before 1.2.11 does not check a certain return value, which allows local users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted offset value in a "virsh vol-upload" command. La función storageVolUpload en el archivo storage/storage_driver.c en libvirt anterior a versión 1.2.11, no comprueba un determinado valor devuelto, lo que permite a los usuarios locales causar una denegación de servicio (desreferencia del puntero NULL y bloqueo del demonio) por medio de un valor de desplazamiento diseñado en un comando "virsh vol-upload". • http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984 http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html http://secunia.com/advisories/61111 http://security.libvirt.org/2014/0009.html https://bugzilla.redhat.com/show_bug.cgi?id=1087104 •
CVE-2013-4399
https://notcve.org/view.php?id=CVE-2013-4399
The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection. La función remoteClientFreeFunc en daemon/remote.c en libvirt anterior a 1.1.3, cuando ACLs están utilizados, no fija una identidad, lo que causa que la eliminación del manejador de eventos se deniega y atacantes remotos causan una denegación de servicio (uso después de liberación y caída) mediante el registro de un manejador de eventos y posteriormente el cierre de la conexión. • http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=8294aa0c1750dcb49d6345cd9bd97bf421580d8b http://secunia.com/advisories/60895 http://security.gentoo.org/glsa/glsa-201412-04.xml http://security.libvirt.org/2013/0013.html http://www.securityfocus.com/bid/62972 •
CVE-2014-7823 – libvirt: dumpxml: information leak with migratable flag
https://notcve.org/view.php?id=CVE-2014-7823
The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag. El virDomainGetXMLDesc API en Libvirt en versiones anteriores a 1.2.11 permite a usuarios remotos de solo lectura obtener la contraseña VNC utilizando el marcador VIR_DOMAIN_XML_MIGRATABLE, lo que desencadena el uso del marcador VIR_DOMAIN_XML_SECURE. It was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. • http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html http://secunia.com/advisories/60010 http://secunia.com/advisories/60895 http://secunia.com/advisories/62058 http://secunia.com/advisories/62303 http://security.gentoo.org/glsa/glsa-201412-04.xml http://security.libvirt.org/2014/0007.html http://www.ubuntu.com/usn/USN-2404-1 https://access.redhat.com/security/cve/CVE-2014-7823 https://bugzilla.redhat.com/show_bug.cgi?id=1160817 • CWE-255: Credentials Management Errors •