Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20101208002137.GE9588@redhat.com>
Date: Tue, 7 Dec 2010 17:21:37 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Eric Blake <eblake@...hat.com>
Subject: CVE request: libvirt when compiled with openvz support has a
 potential security hole

We were notified of a fix to upstream libvirt that plugs a potential
security hole (buffer overflow) via the OpenVZ support in libvirt.

Red Hat and Fedora do not ship libvirt with OpenVZ support enabled; I'm
not sure if other vendors do or not.

The patch was posted publicly today, and although it's a low impact
issue, probably needs a CVE name.

https://www.redhat.com/archives/libvir-list/2010-December/msg00348.html

Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.