|
Message-ID: <20101208002137.GE9588@redhat.com> Date: Tue, 7 Dec 2010 17:21:37 -0700 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Cc: Eric Blake <eblake@...hat.com> Subject: CVE request: libvirt when compiled with openvz support has a potential security hole We were notified of a fix to upstream libvirt that plugs a potential security hole (buffer overflow) via the OpenVZ support in libvirt. Red Hat and Fedora do not ship libvirt with OpenVZ support enabled; I'm not sure if other vendors do or not. The patch was posted publicly today, and although it's a low impact issue, probably needs a CVE name. https://www.redhat.com/archives/libvir-list/2010-December/msg00348.html Thanks. -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.