mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
112 lines
3.7 KiB
JSON
112 lines
3.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2013-6458",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "USN-2093-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "http://www.ubuntu.com/usn/USN-2093-1"
|
|
},
|
|
{
|
|
"name": "56446",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/56446"
|
|
},
|
|
{
|
|
"name": "DSA-2846",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2014/dsa-2846"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043069",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043069"
|
|
},
|
|
{
|
|
"name": "http://libvirt.org/news.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://libvirt.org/news.html"
|
|
},
|
|
{
|
|
"name": "60895",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60895"
|
|
},
|
|
{
|
|
"name": "GLSA-201412-04",
|
|
"refsource": "GENTOO",
|
|
"url": "http://security.gentoo.org/glsa/glsa-201412-04.xml"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2014:0268",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2014:0103",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0103.html"
|
|
},
|
|
{
|
|
"name": "56186",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/56186"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2014:0270",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html"
|
|
}
|
|
]
|
|
}
|
|
} |