First published: Tue Feb 10 2009(Updated: )
A buffer overflow flaw was found in libvirt_proxy. libvirt_proxy is set to run as a setuid root by default, so in theory this could allow for a local user to become root. Normally the stack protector would prevent this from being an issue, but it seems that with gcc optimizations, the function in question is being inlined into main(), preventing the stack protector from catching this. The original report can be found here: <a href="https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html">https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html</a> The patch is here: <a href="http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28">http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libvirt Libvirt | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.