Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 08 Dec 2010 09:07:30 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>, Eric Blake <eblake@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: libvirt when compiled with openvz
 support has a potential security hole

On 12/08/2010 08:21 AM, Vincent Danen wrote:
> We were notified of a fix to upstream libvirt that plugs a potential
> security hole (buffer overflow) via the OpenVZ support in libvirt.
>
> Red Hat and Fedora do not ship libvirt with OpenVZ support enabled; I'm
> not sure if other vendors do or not.
>
> The patch was posted publicly today, and although it's a low impact
> issue, probably needs a CVE name.
>
> https://www.redhat.com/archives/libvir-list/2010-December/msg00348.html

CC'ed Steve.

Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.