Executive Summary

Summary
Title libguestfs security, bug fix, and enhancement update
Informations
Name RHSA-2012:0774 First vendor Publication 2012-06-20
Vendor RedHat Last vendor Modification 2012-06-20
Severity (Vendor) Low Revision 04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated libguestfs packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64

3. Description:

libguestfs is a library for accessing and modifying guest disk images.

It was found that editing files with virt-edit left said files in a world-readable state (and did not preserve the file owner or Security-Enhanced Linux context). If an administrator on the host used virt-edit to edit a file inside a guest, the file would be left with world-readable permissions. This could lead to unprivileged guest users accessing files they would otherwise be unable to. (CVE-2012-2690)

These updated libguestfs packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.3 Technical Notes for information on the most significant of these changes.

Users of libguestfs are advised to upgrade to these updated packages, which fix these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

647174 - RHEL6: virt-clone should remove old udev rules when changing MAC address 679737 - libguestfs: improve error message when zerofree is not available in the appliance 719879 - Rebase libguestfs in RHEL 6.3 729076 - libguestfs confuses Hp_recovery partition with Windows root filesystem 731742 - libguestfs should escape special/non-printing characters in debug output 741183 - [RFE] Write a tool to align the partition(s) in a Windows XP image to a multiple of 8 sectors 760221 - RFE: Support inspection of cciss devices 769359 - virt-resize on RHEL 6 kernel fails to re-read the partition table 785305 - ocaml (bytecode) bindings segfault in 'add_drive_opts' 785668 - aug-defnode: daemon crash 789960 - guestfsd crash when try to mount non-exist disk 790958 - multiprovider build error: RuntimeError: link: /tmp/.guestfs-0/kernel /tmp/.guestfs-0/kernel.10139: File exists 795322 - add_ro should return error if not running in a config state 796520 - [RFE] Prevent user from running some appliance configure commands after appliance boot up 797760 - virt-resize on Windows XP in sysprep state causes "UNMOUNTABLE_BOOT_VOLUME" BSOD 798197 - virt-resize confuses format and output_format variables; using --output-format sets the input format 798980 - Libguestfs live support should be disabled in RHEL 6 packages 799695 - guestfs.h fails to compile with c++ compiler 799798 - set_autosync: this function can only be called in the config state at /usr/share/perl5/vendor_perl/Sys/VirtConvert/GuestfsHandle.pm line 107 801273 - Document for set-pgroup need to be updated 801788 - libguestfs holds open file descriptors when handle is launched 803699 - libguestfs inspection fails on Windows XP: libguestfs: error: hivex: could not locate HKLM\SYSTEM\MountedDevices 807557 - virt-sysprep: wrong params are passed to virt-inspector 807905 - mkfs blocksize option breaks when creating btrfs 809401 - inspection doesn't recognize Fedora 17+ (because of grub2 and UsrMove) 811112 - [RFE][virt-sysprep] hostname can not be changed on rhel system 811117 - [RFE][virt-sysprep] net-hwaddr not removed from "ifcfg-*" files on rhel 811673 - guestfs_last_error not set when qemu fails early during launch 812092 - libguestfs cannot open disk images which are symlinks to files that contain ':' (colon) character 813329 - virt-p2v can not convert physical host on MD device 831117 - CVE-2012-2690 libguestfs: virt-edit creates a new file, when it is used leading to loss of file attributes (permissions, owner, SELinux context etc.)

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2012-0774.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-255 Credentials Management

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21147
 
Oval ID: oval:org.mitre.oval:def:21147
Title: RHSA-2012:0774: libguestfs security, bug fix, and enhancement update (Low)
Description: virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Family: unix Class: patch
Reference(s): RHSA-2012:0774-04
CESA-2012:0774
CVE-2012-2690
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): libguestfs
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23433
 
Oval ID: oval:org.mitre.oval:def:23433
Title: ELSA-2012:0774: libguestfs security, bug fix, and enhancement update (Low)
Description: virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Family: unix Class: patch
Reference(s): ELSA-2012:0774-04
CVE-2012-2690
Version: 6
Platform(s): Oracle Linux 6
Product(s): libguestfs
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27617
 
Oval ID: oval:org.mitre.oval:def:27617
Title: DEPRECATED: ELSA-2012-0774 -- libguestfs security, bug fix, and enhancement update (low)
Description: [1:1.16.19-1] - Rebase to libguestfs 1.16.19 resolves: rhbz#719879 - Rebuild against augeas 0.9.0-3.el6 related: rhbz#808662 - Fix: Don't abort inspection if mdadm.conf ARRAY doesn't have a uuid. - Switch back to git for patch management.
Family: unix Class: patch
Reference(s): ELSA-2012-0774
CVE-2012-2690
Version: 4
Platform(s): Oracle Linux 6
Product(s): libguestfs
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 94

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for libguestfs CESA-2012:0774 centos6
File : nvt/gb_CESA-2012_0774_libguestfs_centos6.nasl
2012-06-22 Name : RedHat Update for libguestfs RHSA-2012:0774-04
File : nvt/gb_RHSA-2012_0774-04_libguestfs.nasl

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0774.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0774.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120620_libguestfs_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-07-11 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0774.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:56:01
  • Multiple Updates