Executive Summary

Informations
Name CVE-2014-3657 First vendor Publication 2014-10-06
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26810
 
Oval ID: oval:org.mitre.oval:def:26810
Title: ELSA-2014-1352 -- libvirt security and bug fix update
Description: [1.1.1-29.0.1.el7_0.3] - Replace docs/et.png in tarball with blank image [1.1.1-29.el7_0.3] - domain_conf: fix domain deadlock (CVE-2014-3657) [1.1.1-29.el7_0.2] - qemu: split out cpuset.mems setting (rhbz#1135871) - qemu: leave restricting cpuset.mems after initialization (rhbz#1135871) - qemu: blkiotune: Use correct definition when looking up disk (CVE-2014-3633)
Family: unix Class: patch
Reference(s): ELSA-2014-1352
CVE-2014-3633
CVE-2014-3657
Version: 4
Platform(s): Oracle Linux 7
Product(s): libvirt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27115
 
Oval ID: oval:org.mitre.oval:def:27115
Title: RHSA-2014:1352: libvirt security and bug fix update (Moderate)
Description: The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. An out-of-bounds read flaw was found in the way libvirt's qemuDomainGetBlockIoTune() function looked up the disk index in a non-persistent (live) disk configuration while a persistent disk configuration was being indexed. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, leak memory from the libvirtd process. (CVE-2014-3633) A denial of service flaw was found in the way libvirt's virConnectListAllDomains() function computed the number of used domains. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to make any domain operations within libvirt unresponsive. (CVE-2014-3657) The CVE-2014-3633 issue was discovered by Luyao Huang of Red Hat. This update also fixes the following bug: * Prior to this update, libvirt was setting the cpuset.mems parameter for domains with numatune/memory[nodeset] prior to starting them. As a consequence, domains with such a nodeset, which excluded the NUMA node with DMA and DMA32 zones (found in /proc/zoneinfo), could not be started due to failed KVM initialization. With this update, libvirt sets the cpuset.mems parameter after the initialization, and domains with any nodeset (in /numatune/memory) can be started without an error. (BZ#1135871) All libvirt users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, libvirtd will be restarted automatically.
Family: unix Class: patch
Reference(s): RHSA-2014:1352-00
CESA-2014:1352
CVE-2014-3633
CVE-2014-3657
Version: 3
Platform(s): Red Hat Enterprise Linux 7
CentOS Linux 7
Product(s): libvirt
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 42

Nessus® Vulnerability Scanner

Date Description
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-115.nasl - Type : ACT_GATHER_INFO
2014-11-21 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1873.nasl - Type : ACT_GATHER_INFO
2014-11-20 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1873.nasl - Type : ACT_GATHER_INFO
2014-11-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1873.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2404-1.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-585.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-586.nasl - Type : ACT_GATHER_INFO
2014-10-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1352.nasl - Type : ACT_GATHER_INFO
2014-10-06 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-195.nasl - Type : ACT_GATHER_INFO
2014-10-02 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1352.nasl - Type : ACT_GATHER_INFO
2014-10-02 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1352.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://security.libvirt.org/2014/0005.html
MISC http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b4...
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1352.html
SECUNIA http://secunia.com/advisories/60291
http://secunia.com/advisories/62303
SUSE http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
UBUNTU http://www.ubuntu.com/usn/USN-2404-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Date Informations
2023-02-13 05:28:18
  • Multiple Updates
2023-02-03 00:28:32
  • Multiple Updates
2021-05-05 01:15:23
  • Multiple Updates
2021-05-04 12:32:28
  • Multiple Updates
2021-04-22 01:39:31
  • Multiple Updates
2020-05-23 01:52:14
  • Multiple Updates
2020-05-23 00:41:10
  • Multiple Updates
2017-01-07 13:25:59
  • Multiple Updates
2016-05-25 13:24:40
  • Multiple Updates
2016-04-27 00:53:49
  • Multiple Updates
2016-04-26 13:27:45
  • Multiple Updates
2015-12-05 13:26:36
  • Multiple Updates
2015-03-31 13:28:35
  • Multiple Updates
2015-03-14 13:25:28
  • Multiple Updates
2015-02-25 13:24:07
  • Multiple Updates
2014-11-26 13:28:16
  • Multiple Updates
2014-11-22 13:23:57
  • Multiple Updates
2014-11-21 13:25:04
  • Multiple Updates
2014-11-19 09:23:48
  • Multiple Updates
2014-11-13 13:27:03
  • Multiple Updates
2014-10-31 13:24:35
  • Multiple Updates
2014-10-24 13:26:42
  • Multiple Updates
2014-10-16 13:25:25
  • Multiple Updates
2014-10-08 13:25:04
  • Multiple Updates
2014-10-07 21:28:12
  • Multiple Updates
2014-10-06 21:27:29
  • First insertion