CVE-2014-3633
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
06/10/2014
Last modified:
12/04/2025
Description
The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:* | 1.2.8 (including) | |
| cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommitdiff%3Bh%3D3e745e8f775dfe6f64f18b5c2fe4791b35d3546b
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2014-1352.html
- http://secunia.com/advisories/60291
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0004.html
- http://www.debian.org/security/2014/dsa-3038
- http://www.ubuntu.com/usn/USN-2366-1
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommitdiff%3Bh%3D3e745e8f775dfe6f64f18b5c2fe4791b35d3546b
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2014-1352.html
- http://secunia.com/advisories/60291
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0004.html
- http://www.debian.org/security/2014/dsa-3038
- http://www.ubuntu.com/usn/USN-2366-1



