Two vulnerabilities in <app-emulation/libvirt-0.8.3. CVE-2010-2237 Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. CVE-2010-2238 Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. Since 0.8.3 is already in the tree, and no stable versions exist, perhaps we could use this bug to remove prior, vulnerable versions.
Please remove the vulnerable versions <libvirt-0.8.3 from the tree. Thanks!
CVE-2010-2237 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2237): Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. CVE-2010-2238 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2238): Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. CVE-2010-2239 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2239): Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors. CVE-2010-2242 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2242): Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
These have all been removed from the tree.
Marking as fixed since no version was marked stable.