Low CentOS libguestfs Update

Metadata

low
unknown
libguestfs-1.16.19-1.el6.src.rpm, libguestfs-1.16.19-1.el6.x86_64.rpm, libguestfs-devel-1.16.19-1.el6.x86_64.rpm, libguestfs-java-1.16.19-1.el6.x86_64.rpm, libguestfs-java-devel-1.16.19-1.el6.x86_64.rpm, libguestfs-javadoc-1.16.19-1.el6.x86_64.rpm, libguestfs-tools-1.16.19-1.el6.x86_64.rpm, libguestfs-tools-c-1.16.19-1.el6.x86_64.rpm, ocaml-libguestfs-1.16.19-1.el6.x86_64.rpm, ocaml-libguestfs-devel-1.16.19-1.el6.x86_64.rpm, perl-Sys-Guestfs-1.16.19-1.el6.x86_64.rpm, python-libguestfs-1.16.19-1.el6.x86_64.rpm, ruby-libguestfs-1.16.19-1.el6.x86_64.rpm
rhn.redhat.com, lists.centos.org
2012-07-10
2017-07-27 20:03
2017-07-27 19:03
2017-04-01 19:06
2017-01-05 20:09

Description


Updated libguestfs packages that fix one security issue, several bugs, and
add various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

libguestfs is a library for accessing and modifying guest disk images.

It was found that editing files with virt-edit left said files in a
world-readable state (and did not preserve the file owner or
Security-Enhanced Linux context). If an administrator on the host used
virt-edit to edit a file inside a guest, the file would be left with
world-readable permissions. This could lead to unprivileged guest users
accessing files they would otherwise be unable to. (CVE-2012-2690)

These updated libguestfs packages include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 6.3 Technical
Notes for information on the most significant of these changes.

Users of libguestfs are advised to upgrade to these updated packages, which
fix these issues and add these enhancements.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 libguestfs libguestfs-1.16.19-1.el6.src.rpm
libguestfs libguestfs-1.16.19-1.el6.x86_64.rpm
libguestfs-devel libguestfs-devel-1.16.19-1.el6.x86_64.rpm
libguestfs-java libguestfs-java-1.16.19-1.el6.x86_64.rpm
libguestfs-java-devel libguestfs-java-devel-1.16.19-1.el6.x86_64.rpm
libguestfs-javadoc libguestfs-javadoc-1.16.19-1.el6.x86_64.rpm
libguestfs-tools libguestfs-tools-1.16.19-1.el6.x86_64.rpm
libguestfs-tools-c libguestfs-tools-c-1.16.19-1.el6.x86_64.rpm
ocaml-libguestfs ocaml-libguestfs-1.16.19-1.el6.x86_64.rpm
ocaml-libguestfs-devel ocaml-libguestfs-devel-1.16.19-1.el6.x86_64.rpm
perl-Sys-Guestfs perl-Sys-Guestfs-1.16.19-1.el6.x86_64.rpm
python-libguestfs python-libguestfs-1.16.19-1.el6.x86_64.rpm
ruby-libguestfs ruby-libguestfs-1.16.19-1.el6.x86_64.rpm