exploit the possibilities

Ubuntu Security Notice USN-1152-1

Ubuntu Security Notice USN-1152-1
Posted Jun 16, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1152-1 - It was discovered that libvirt did not use thread-safe error reporting. A remote attacker could exploit this to cause a denial of service via application crash. Eric Blake discovered that libvirt had an off-by-one error which could be used to reopen disk probing and bypass the fix for CVE-2010-2238. A privileged attacker in the guest could exploit this to read arbitrary files on the host. This issue only affected Ubuntu 11.04. By default, guests are confined by an AppArmor profile which provided partial protection against this flaw. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-1486, CVE-2011-2178
MD5 | 86d657488cdd4910856ec07cd4342fe2

Ubuntu Security Notice USN-1152-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-1152-1
June 16, 2011

libvirt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS

Summary:

Libvirt could be made to crash or read arbitrary files on the host.

Software Description:
- libvirt: Libvirt virtualization toolkit

Details:

It was discovered that libvirt did not use thread-safe error reporting. A
remote attacker could exploit this to cause a denial of service via
application crash. (CVE-2011-1486)

Eric Blake discovered that libvirt had an off-by-one error which could
be used to reopen disk probing and bypass the fix for CVE-2010-2238. A
privileged attacker in the guest could exploit this to read arbitrary files
on the host. This issue only affected Ubuntu 11.04. By default, guests are
confined by an AppArmor profile which provided partial protection against
this flaw. (CVE-2011-2178)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
libvirt-bin 0.8.8-1ubuntu6.2
libvirt0 0.8.8-1ubuntu6.2

Ubuntu 10.10:
libvirt-bin 0.8.3-1ubuntu18
libvirt0 0.8.3-1ubuntu18

Ubuntu 10.04 LTS:
libvirt-bin 0.7.5-5ubuntu27.13
libvirt0 0.7.5-5ubuntu27.13

In general, a standard system update will make all the necessary changes.

References:
CVE-2011-1486, CVE-2011-2178

Package Information:
https://launchpad.net/ubuntu/+source/libvirt/0.8.8-1ubuntu6.2
https://launchpad.net/ubuntu/+source/libvirt/0.8.3-1ubuntu18
https://launchpad.net/ubuntu/+source/libvirt/0.7.5-5ubuntu27.13


Login or Register to add favorites

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close