Vulnerabilities > CVE-2014-7823 - Credentials Management vulnerability in Redhat Libvirt

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
redhat
CWE-255
nessus

Summary

The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.

Vulnerable Configurations

Part Description Count
Application
Redhat
247

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1873.NASL
    descriptionUpdated libvirt packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. An out-of-bounds read flaw was found in the way libvirt
    last seen2020-06-01
    modified2020-06-02
    plugin id79329
    published2014-11-19
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79329
    titleRHEL 6 : libvirt (RHSA-2014:1873)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-695.NASL
    descriptionlibvirt was updated to fix one security issue. This security issue was fixed : - Security issue with migratable flag (CVE-2014-7823).
    last seen2020-06-05
    modified2014-11-24
    plugin id79412
    published2014-11-24
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79412
    titleopenSUSE Security Update : libvirt (openSUSE-SU-2014:1471-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150105_LIBVIRT_ON_SL7_X.NASL
    descriptionIt was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. (CVE-2014-7823) This update also fixes the following bugs : - In Scientific Linux 6, libvirt relies on the QEMU emulator to supply the error message when an active commit is attempted. However, with Scientific Linux 7, QEMU added support for an active commit, but an additional interaction from libvirt to fully enable active commits is still missing. As a consequence, attempts to perform an active commit caused libvirt to become unresponsive. With this update, libvirt has been fixed to detect an active commit by itself, and now properly declares the feature as unsupported. As a result, libvirt no longer hangs when an active commit is attempted and instead produces an error message. - Prior to this update, the libvirt API did not properly check whether a Discretionary Access Control (DAC) security label is non-NULL before trying to parse user/group ownership from it. In addition, the DAC security label of a transient domain that had just finished migrating to another host is in some cases NULL. As a consequence, when the virDomainGetBlockInfo API was called on such a domain, the libvirtd daemon sometimes terminated unexpectedly. With this update, libvirt properly checks DAC labels before trying to parse them, and libvirtd thus no longer crashes in the described scenario. - If a block copy operation was attempted while another block copy was already in progress to an explicit raw destination, libvirt previously stopped regarding the destination as raw. As a consequence, if the qemu.conf file was edited to allow file format probing, triggering the bug could allow a malicious guest to bypass sVirt protection by making libvirt regard the file as non-raw. With this update, libvirt has been fixed to consistently remember when a block copy destination is raw, and guests can no longer circumvent sVirt protection when the host is configured to allow format probing. After installing the updated packages, libvirtd will be restarted automatically.
    last seen2020-03-18
    modified2015-01-07
    plugin id80397
    published2015-01-07
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80397
    titleScientific Linux Security Update : libvirt on SL7.x x86_64 (20150105)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-115.NASL
    descriptionUpdated libvirt packages fix security vulnerabilities : The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to paths under /proc//root and the virInitctlSetRunLevel function (CVE-2013-6456). libvirt was patched to prevent expansion of entities when parsing XML files. This vulnerability allowed malicious users to read arbitrary files or cause a denial of service (CVE-2014-0179). An out-of-bounds read flaw was found in the way libvirt
    last seen2020-06-01
    modified2020-06-02
    plugin id82368
    published2015-03-30
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82368
    titleMandriva Linux Security Advisory : libvirt (MDVSA-2015:115)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201412-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201412-04 (libvirt: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details. Impact : A remote attacker may be able to cause a Denial of Service or cause information leakage. A local attacker may be able to escalate privileges, cause a Denial of Service or possibly execute arbitrary code. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id79814
    published2014-12-09
    reporterThis script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79814
    titleGLSA-201412-04 : libvirt: Multiple vulnerabilities
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-222.NASL
    descriptionUpdated libvirt packages fix security vulnerability : Eric Blake discovered that libvirt incorrectly handled permissions when processing the qemuDomainFormatXML command. An attacker with read-only privileges could possibly use this to gain access to certain information from the domain xml file (CVE-2014-7823).
    last seen2020-06-01
    modified2020-06-02
    plugin id79409
    published2014-11-24
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79409
    titleMandriva Linux Security Advisory : libvirt (MDVSA-2014:222)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-15228.NASL
    description - Rebased to version 1.1.3.8 - CVE-2014-3633: out-of-bounds read in blockiotune (bz #1160823) - CVE-2014-3657: Potential deadlock in domain_conf (bz #1160824) - CVE-2014-7823: information leak with migratable flag (bz #1160822) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-11-24
    plugin id79397
    published2014-11-24
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79397
    titleFedora 20 : libvirt-1.1.3.8-1.fc20 (2014-15228)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-1873.NASL
    descriptionUpdated libvirt packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. An out-of-bounds read flaw was found in the way libvirt
    last seen2020-06-01
    modified2020-06-02
    plugin id79338
    published2014-11-20
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79338
    titleCentOS 6 : libvirt (CESA-2014:1873)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0008.NASL
    descriptionUpdated libvirt packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. It was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. (CVE-2014-7823) This issue was discovered by Eric Blake of Red Hat. This update also fixes the following bugs : * In Red Hat Enterprise Linux 6, libvirt relies on the QEMU emulator to supply the error message when an active commit is attempted. However, with Red Hat Enterprise Linux 7, QEMU added support for an active commit, but an additional interaction from libvirt to fully enable active commits is still missing. As a consequence, attempts to perform an active commit caused libvirt to become unresponsive. With this update, libvirt has been fixed to detect an active commit by itself, and now properly declares the feature as unsupported. As a result, libvirt no longer hangs when an active commit is attempted and instead produces an error message. Note that the missing libvirt interaction will be added in Red Hat Enterprise Linux 7.1, adding full support for active commits. (BZ#1150379) * Prior to this update, the libvirt API did not properly check whether a Discretionary Access Control (DAC) security label is non-NULL before trying to parse user/group ownership from it. In addition, the DAC security label of a transient domain that had just finished migrating to another host is in some cases NULL. As a consequence, when the virDomainGetBlockInfo API was called on such a domain, the libvirtd daemon sometimes terminated unexpectedly. With this update, libvirt properly checks DAC labels before trying to parse them, and libvirtd thus no longer crashes in the described scenario. (BZ#1171124) * If a block copy operation was attempted while another block copy was already in progress to an explicit raw destination, libvirt previously stopped regarding the destination as raw. As a consequence, if the qemu.conf file was edited to allow file format probing, triggering the bug could allow a malicious guest to bypass sVirt protection by making libvirt regard the file as non-raw. With this update, libvirt has been fixed to consistently remember when a block copy destination is raw, and guests can no longer circumvent sVirt protection when the host is configured to allow format probing. (BZ#1149078) All libvirt users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id80388
    published2015-01-06
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80388
    titleRHEL 7 : libvirt (RHSA-2015:0008)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20141118_LIBVIRT_ON_SL6_X.NASL
    descriptionAn out-of-bounds read flaw was found in the way libvirt
    last seen2020-03-18
    modified2014-11-19
    plugin id79331
    published2014-11-19
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79331
    titleScientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20141118)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-0008.NASL
    descriptionFrom Red Hat Security Advisory 2015:0008 : Updated libvirt packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. It was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. (CVE-2014-7823) This issue was discovered by Eric Blake of Red Hat. This update also fixes the following bugs : * In Red Hat Enterprise Linux 6, libvirt relies on the QEMU emulator to supply the error message when an active commit is attempted. However, with Red Hat Enterprise Linux 7, QEMU added support for an active commit, but an additional interaction from libvirt to fully enable active commits is still missing. As a consequence, attempts to perform an active commit caused libvirt to become unresponsive. With this update, libvirt has been fixed to detect an active commit by itself, and now properly declares the feature as unsupported. As a result, libvirt no longer hangs when an active commit is attempted and instead produces an error message. Note that the missing libvirt interaction will be added in Red Hat Enterprise Linux 7.1, adding full support for active commits. (BZ#1150379) * Prior to this update, the libvirt API did not properly check whether a Discretionary Access Control (DAC) security label is non-NULL before trying to parse user/group ownership from it. In addition, the DAC security label of a transient domain that had just finished migrating to another host is in some cases NULL. As a consequence, when the virDomainGetBlockInfo API was called on such a domain, the libvirtd daemon sometimes terminated unexpectedly. With this update, libvirt properly checks DAC labels before trying to parse them, and libvirtd thus no longer crashes in the described scenario. (BZ#1171124) * If a block copy operation was attempted while another block copy was already in progress to an explicit raw destination, libvirt previously stopped regarding the destination as raw. As a consequence, if the qemu.conf file was edited to allow file format probing, triggering the bug could allow a malicious guest to bypass sVirt protection by making libvirt regard the file as non-raw. With this update, libvirt has been fixed to consistently remember when a block copy destination is raw, and guests can no longer circumvent sVirt protection when the host is configured to allow format probing. (BZ#1149078) All libvirt users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id80387
    published2015-01-06
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80387
    titleOracle Linux 7 : libvirt (ELSA-2015-0008)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2404-1.NASL
    descriptionPavel Hrdina discovered that libvirt incorrectly handled locking when processing the virConnectListAllDomains command. An attacker could use this issue to cause libvirtd to hang, resulting in a denial of service. (CVE-2014-3657) Eric Blake discovered that libvirt incorrectly handled permissions when processing the qemuDomainFormatXML command. An attacker with read-only privileges could possibly use this to gain access to certain information from the domain xml file. (CVE-2014-7823). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id79210
    published2014-11-12
    reporterUbuntu Security Notice (C) 2014-2019 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79210
    titleUbuntu 14.04 LTS / 14.10 : libvirt vulnerabilities (USN-2404-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-0008.NASL
    descriptionUpdated libvirt packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. It was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. (CVE-2014-7823) This issue was discovered by Eric Blake of Red Hat. This update also fixes the following bugs : * In Red Hat Enterprise Linux 6, libvirt relies on the QEMU emulator to supply the error message when an active commit is attempted. However, with Red Hat Enterprise Linux 7, QEMU added support for an active commit, but an additional interaction from libvirt to fully enable active commits is still missing. As a consequence, attempts to perform an active commit caused libvirt to become unresponsive. With this update, libvirt has been fixed to detect an active commit by itself, and now properly declares the feature as unsupported. As a result, libvirt no longer hangs when an active commit is attempted and instead produces an error message. Note that the missing libvirt interaction will be added in Red Hat Enterprise Linux 7.1, adding full support for active commits. (BZ#1150379) * Prior to this update, the libvirt API did not properly check whether a Discretionary Access Control (DAC) security label is non-NULL before trying to parse user/group ownership from it. In addition, the DAC security label of a transient domain that had just finished migrating to another host is in some cases NULL. As a consequence, when the virDomainGetBlockInfo API was called on such a domain, the libvirtd daemon sometimes terminated unexpectedly. With this update, libvirt properly checks DAC labels before trying to parse them, and libvirtd thus no longer crashes in the described scenario. (BZ#1171124) * If a block copy operation was attempted while another block copy was already in progress to an explicit raw destination, libvirt previously stopped regarding the destination as raw. As a consequence, if the qemu.conf file was edited to allow file format probing, triggering the bug could allow a malicious guest to bypass sVirt protection by making libvirt regard the file as non-raw. With this update, libvirt has been fixed to consistently remember when a block copy destination is raw, and guests can no longer circumvent sVirt protection when the host is configured to allow format probing. (BZ#1149078) All libvirt users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id80360
    published2015-01-06
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80360
    titleCentOS 7 : libvirt (CESA-2015:0008)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-1873.NASL
    descriptionFrom Red Hat Security Advisory 2014:1873 : Updated libvirt packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. An out-of-bounds read flaw was found in the way libvirt
    last seen2020-06-01
    modified2020-06-02
    plugin id79372
    published2014-11-21
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79372
    titleOracle Linux 6 : libvirt (ELSA-2014-1873)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_KVM-LIBVIRT-201412-150123.NASL
    descriptionThis collective update for KVM and libvirt provides fixes for security and non-security issues. kvm : - Fix NULL pointer dereference because of uninitialized UDP socket. (bsc#897654, CVE-2014-3640) - Fix performance degradation after migration. (bsc#878350) - Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag in FS_IOC_FIEMAP ioctl. (bsc#908381) - Add validate hex properties for qdev. (bsc#852397) - Add boot option to do strict boot (bsc#900084) - Add query-command-line-options QMP command. (bsc#899144) - Fix incorrect return value of migrate_cancel. (bsc#843074) - Fix insufficient parameter validation during ram load. (bsc#905097, CVE-2014-7840) - Fix insufficient blit region checks in qemu/cirrus. (bsc#907805, CVE-2014-8106) libvirt : - Fix security hole with migratable flag in dumpxml. (bsc#904176, CVE-2014-7823) - Fix domain deadlock. (bsc#899484, CVE-2014-3657) - Use correct definition when looking up disk in qemu blkiotune. (bsc#897783, CVE-2014-3633) - Fix undefined symbol when starting virtlockd. (bsc#910145) - Add
    last seen2020-06-01
    modified2020-06-02
    plugin id81480
    published2015-02-24
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81480
    titleSuSE 11.3 Security Update : kvm and libvirt (SAT Patch Number 10222)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_KVM-LIBVIRT-201412-150124.NASL
    descriptionThis collective update for KVM and libvirt provides fixes for security and non-security issues. kvm : - Fix NULL pointer dereference because of uninitialized UDP socket. (bsc#897654, CVE-2014-3640) - Fix performance degradation after migration. (bsc#878350) - Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag in FS_IOC_FIEMAP ioctl. (bsc#908381) - Add validate hex properties for qdev. (bsc#852397) - Add boot option to do strict boot (bsc#900084) - Add query-command-line-options QMP command. (bsc#899144) - Fix incorrect return value of migrate_cancel. (bsc#843074) - Fix insufficient parameter validation during ram load. (bsc#905097, CVE-2014-7840) - Fix insufficient blit region checks in qemu/cirrus. (bsc#907805, CVE-2014-8106) libvirt : - Fix security hole with migratable flag in dumpxml. (bsc#904176, CVE-2014-7823) - Fix domain deadlock. (bsc#899484, CVE-2014-3657) - Use correct definition when looking up disk in qemu blkiotune. (bsc#897783, CVE-2014-3633) - Fix undefined symbol when starting virtlockd. (bsc#910145) - Add
    last seen2020-06-01
    modified2020-06-02
    plugin id81481
    published2015-02-24
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81481
    titleSuSE 11.3 Security Update : kvm and libvirt (SAT Patch Number 10222)

Redhat

advisories
  • bugzilla
    id1160817
    titleCVE-2014-7823 libvirt: dumpxml: information leak with migratable flag
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentlibvirt-lock-sanlock is earlier than 0:0.10.2-46.el6_6.2
            ovaloval:com.redhat.rhsa:tst:20141873001
          • commentlibvirt-lock-sanlock is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581002
        • AND
          • commentlibvirt-python is earlier than 0:0.10.2-46.el6_6.2
            ovaloval:com.redhat.rhsa:tst:20141873003
          • commentlibvirt-python is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581006
        • AND
          • commentlibvirt is earlier than 0:0.10.2-46.el6_6.2
            ovaloval:com.redhat.rhsa:tst:20141873005
          • commentlibvirt is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581010
        • AND
          • commentlibvirt-client is earlier than 0:0.10.2-46.el6_6.2
            ovaloval:com.redhat.rhsa:tst:20141873007
          • commentlibvirt-client is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581008
        • AND
          • commentlibvirt-devel is earlier than 0:0.10.2-46.el6_6.2
            ovaloval:com.redhat.rhsa:tst:20141873009
          • commentlibvirt-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581004
    rhsa
    idRHSA-2014:1873
    released2014-11-18
    severityModerate
    titleRHSA-2014:1873: libvirt security and bug fix update (Moderate)
  • bugzilla
    id1171124
    titlelibvirtd occasionally crashes at the end of migration
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentlibvirt-login-shell is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008001
          • commentlibvirt-login-shell is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914034
        • AND
          • commentlibvirt-daemon-lxc is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008003
          • commentlibvirt-daemon-lxc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914030
        • AND
          • commentlibvirt-lock-sanlock is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008005
          • commentlibvirt-lock-sanlock is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581002
        • AND
          • commentlibvirt-client is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008007
          • commentlibvirt-client is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581008
        • AND
          • commentlibvirt-daemon-driver-secret is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008009
          • commentlibvirt-daemon-driver-secret is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914024
        • AND
          • commentlibvirt-daemon-config-network is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008011
          • commentlibvirt-daemon-config-network is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914026
        • AND
          • commentlibvirt-daemon-driver-interface is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008013
          • commentlibvirt-daemon-driver-interface is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914012
        • AND
          • commentlibvirt-daemon-driver-lxc is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008015
          • commentlibvirt-daemon-driver-lxc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914038
        • AND
          • commentlibvirt-docs is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008017
          • commentlibvirt-docs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914028
        • AND
          • commentlibvirt-python is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008019
          • commentlibvirt-python is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581006
        • AND
          • commentlibvirt-daemon-driver-nodedev is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008021
          • commentlibvirt-daemon-driver-nodedev is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914006
        • AND
          • commentlibvirt-daemon-config-nwfilter is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008023
          • commentlibvirt-daemon-config-nwfilter is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914020
        • AND
          • commentlibvirt-daemon-driver-network is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008025
          • commentlibvirt-daemon-driver-network is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914010
        • AND
          • commentlibvirt is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008027
          • commentlibvirt is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581010
        • AND
          • commentlibvirt-daemon-driver-storage is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008029
          • commentlibvirt-daemon-driver-storage is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914040
        • AND
          • commentlibvirt-daemon is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008031
          • commentlibvirt-daemon is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914008
        • AND
          • commentlibvirt-devel is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008033
          • commentlibvirt-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131581004
        • AND
          • commentlibvirt-daemon-driver-nwfilter is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008035
          • commentlibvirt-daemon-driver-nwfilter is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914002
        • AND
          • commentlibvirt-daemon-driver-qemu is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008037
          • commentlibvirt-daemon-driver-qemu is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914016
        • AND
          • commentlibvirt-daemon-kvm is earlier than 0:1.1.1-29.el7_0.4
            ovaloval:com.redhat.rhsa:tst:20150008039
          • commentlibvirt-daemon-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140914022
    rhsa
    idRHSA-2015:0008
    released2015-01-05
    severityLow
    titleRHSA-2015:0008: libvirt security and bug fix update (Low)
rpms
  • libvirt-0:0.10.2-46.el6_6.2
  • libvirt-client-0:0.10.2-46.el6_6.2
  • libvirt-debuginfo-0:0.10.2-46.el6_6.2
  • libvirt-devel-0:0.10.2-46.el6_6.2
  • libvirt-lock-sanlock-0:0.10.2-46.el6_6.2
  • libvirt-python-0:0.10.2-46.el6_6.2
  • libvirt-0:1.1.1-29.el7_0.4
  • libvirt-client-0:1.1.1-29.el7_0.4
  • libvirt-daemon-0:1.1.1-29.el7_0.4
  • libvirt-daemon-config-network-0:1.1.1-29.el7_0.4
  • libvirt-daemon-config-nwfilter-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-interface-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-lxc-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-network-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-nodedev-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-nwfilter-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-qemu-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-secret-0:1.1.1-29.el7_0.4
  • libvirt-daemon-driver-storage-0:1.1.1-29.el7_0.4
  • libvirt-daemon-kvm-0:1.1.1-29.el7_0.4
  • libvirt-daemon-lxc-0:1.1.1-29.el7_0.4
  • libvirt-debuginfo-0:1.1.1-29.el7_0.4
  • libvirt-devel-0:1.1.1-29.el7_0.4
  • libvirt-docs-0:1.1.1-29.el7_0.4
  • libvirt-lock-sanlock-0:1.1.1-29.el7_0.4
  • libvirt-login-shell-0:1.1.1-29.el7_0.4
  • libvirt-python-0:1.1.1-29.el7_0.4