First published: Fri Jul 19 2013(Updated: )
A part of the returned monitor response was freed twice and caused crashes of the daemon when using guest agent cpu count retrieval. A remote user able to issue commands to libvirt daemon could use this flaw to crash libvirtd or, potentially, escalate their privilages to that of libvirtd process. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - Crash of libvirtd without guest agent configuration" href="show_bug.cgi?id=984821">https://bugzilla.redhat.com/show_bug.cgi?id=984821</a> <a href="https://www.redhat.com/archives/libvir-list/2013-July/msg01035.html">https://www.redhat.com/archives/libvir-list/2013-July/msg01035.html</a> Acknowledgements: This issue was discovered by Petr Krempa of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | =1.0.6 | |
Redhat Libvirt | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.