CVE-2013-5651
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/09/2013
Last modified:
11/04/2025
Description
The virBitmapParse function in util/virbitmap.c in libvirt before 1.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a crafted bitmap, as demonstrated by a large nodeset value to numatune.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* | 1.1.1 (including) | |
cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommit%3Bh%3D47b9127e883677a0d60d767030a147450e919a25
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://www.openwall.com/lists/oss-security/2013/08/30/1
- http://www.ubuntu.com/usn/USN-1954-1
- https://bugzilla.redhat.com/show_bug.cgi?id=997367
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommit%3Bh%3D47b9127e883677a0d60d767030a147450e919a25
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://www.openwall.com/lists/oss-security/2013/08/30/1
- http://www.ubuntu.com/usn/USN-1954-1
- https://bugzilla.redhat.com/show_bug.cgi?id=997367