Executive Summary
Summary | |
---|---|
Title | libguestfs and virt-p2v security, bug fix, and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2016:2576 | First vendor Publication | 2016-11-03 |
Vendor | RedHat | Last vendor Modification | 2016-11-03 |
Severity (Vendor) | N/A | Revision | 02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for libguestfs and virt-p2v is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Virt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). (BZ#1218766) Security Fix(es): * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 855058 - RFE: virt-p2v: display more information about storage devices 1064041 - virt-sparsify fails if a btrfs filesystem contains readonly snapshots 1099976 - virt-builder gives GPG warning message with gnupg2 1156298 - Remove files in package libguestfs-bash-completion, these files are bash completion files, some of the virt tool completion are already implement in another file, so can remove its completion file 1164708 - set-label can only set <=127 bytes for btrfs and <=126 bytes for ntfs filesystem which not meet the help message. Also for ntfs it should give a warning message when the length >128 bytes 1166057 - btrfs filesystem will not work well if you create the filesystem with multiple disks at the same time, such as: mkfs-btrfs "/dev/sda1 /dev/sdb1" 1167916 - P2V: invalid conversion server prints unexpected end of file waiting for password prompt. 1173695 - RFE: allow passing in a pre-opened libvirt connection from python 1174551 - "lstatnslist" and "lstatlist" don't give an error if the API is used wrongly 1176801 - File /etc/sysconfig/kernel isn't updated when convert XenPV guest with regular kernel installed 1180769 - Security context on image file gets reset 1190669 - Support virt-v2v conversion of Windows > 7 1213324 - virt-v2v: warning: unknown guest operating system: windows windows 6.3 when converting win8,win8.1,win2012,win2012R2,win10 to rhev 1213701 - Fail to import win8/win2012 to rhev with error "selected display type is not supported" 1218766 - Rebase libguestfs in RHEL 7.3 1225789 - Wrong video driver is installed for rhel5.11 guest after conversion to libvirt 1227599 - P2V invalid password prints unexpected end of file waiting for command prompt. 1227609 - virt-p2v: Using "Back" button causes output list to be repopulated multiple times 1229119 - Unrelated info in fstab makes virt-v2v fail with unclear error info 1229386 - virt-p2v in non-GUI mode doesn't show any conversion progress or status 1238053 - v2v:Duplicate disk target set when convert guest with cdrom attached 1239154 - appliance fails to start with "supermin: ext2fs_file_write: /var/log/tallylog: Could not allocate block in ext2 filesystem" 1242853 - mount-loop failed to setup loop device: No such file or directory 1260801 - virt-builder --ssh-inject doesn't set proper permissions on created files 1261242 - virt-v2v should prevent using '-of' option appears twice on the command line 1261436 - No warning shows when convert a win7 guest with AVG AntiVirus installed 1262959 - virt-builder/virt-customize set password does not work 1264835 - ppc64le: virt-customize --install fail to detect the guest arch 1267032 - guestfish copy-in command behaves oddly/unexpectedly with wildcards 1277074 - Virt-p2v client shouldn't present the vdsm option because it's not usable 1277122 - RFE: virt-sparsify: make '--in-place' sparsification safe to abort (gracefully or ungracefully) 1287826 - Remove virt-v2v support for ppc64le 1290755 - guestfish should be able to handle LVM thin layouts 1292437 - Backport virt-v2v pull dcpath from libvirt |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2016-2576.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-200 | Information Exposure |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-10-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3437-1.nasl - Type : ACT_GATHER_INFO |
2017-05-02 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2017-1061.nasl - Type : ACT_GATHER_INFO |
2017-04-06 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170321_ocaml_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2017-04-06 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170321_libguestfs_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2017-03-30 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2017-0049.nasl - Type : ACT_GATHER_INFO |
2017-03-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-0565.nasl - Type : ACT_GATHER_INFO |
2017-03-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-0564.nasl - Type : ACT_GATHER_INFO |
2017-03-27 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-0565.nasl - Type : ACT_GATHER_INFO |
2017-03-27 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-0564.nasl - Type : ACT_GATHER_INFO |
2017-03-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0565.nasl - Type : ACT_GATHER_INFO |
2017-03-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0564.nasl - Type : ACT_GATHER_INFO |
2017-02-21 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201702-15.nasl - Type : ACT_GATHER_INFO |
2016-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161103_libguestfs_and_virt_p2v_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-11-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2576.nasl - Type : ACT_GATHER_INFO |
2016-11-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2576.nasl - Type : ACT_GATHER_INFO |
2016-11-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2576.nasl - Type : ACT_GATHER_INFO |
2016-09-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1072.nasl - Type : ACT_GATHER_INFO |
2016-07-14 | Name : The remote Fedora host is missing a security update. File : fedora_2016-78ad11154f.nasl - Type : ACT_GATHER_INFO |
2016-07-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160623_ocaml_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-06-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1296.nasl - Type : ACT_GATHER_INFO |
2016-06-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1296.nasl - Type : ACT_GATHER_INFO |
2016-06-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1296.nasl - Type : ACT_GATHER_INFO |
2016-05-20 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-605.nasl - Type : ACT_GATHER_INFO |
2016-05-12 | Name : The remote Debian host is missing a security update. File : debian_DLA-466.nasl - Type : ACT_GATHER_INFO |
2016-05-09 | Name : The remote Fedora host is missing a security update. File : fedora_2016-1c4e616564.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-11-29 13:23:41 |
|
2016-11-12 13:25:32 |
|
2016-11-05 13:24:39 |
|
2016-11-03 13:22:41 |
|