First published: Wed Jan 09 2013(Updated: )
A flaw was found in the way message freeing on connection cleanup was handled under certain error conditions. A remote user able to issue commands to libvirt daemon could use this flaw to crash libvirtd or, potentially, escalate their privilages to that of libvirtd process. Acknowledgements: This issue was discovered by Tingting Zheng of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | >=0.9.6<0.9.6.4 | |
Redhat Libvirt | >=0.9.11<0.9.11.9 | |
Redhat Libvirt | >=0.10.2<0.10.2.3 | |
Redhat Libvirt | >=1.0.0<1.0.2 | |
openSUSE openSUSE | =12.1 | |
openSUSE openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Fedoraproject Fedora | =16 | |
Fedoraproject Fedora | =17 | |
Fedoraproject Fedora | =18 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Eus | =6.3 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.