CVE-2011-2511
Published: 12 July 2011
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Notes
Author | Note |
---|---|
jdstrand | DoS is confirmed by a remote authenticated user 89d994ad6b0e8ebe9a2cd4e0e37119ff4c917550 (gnulib) may not actually be required to fix in stable releases. fixed in 0.8.3-5+squeeze2 |
Priority
Status
Package | Release | Status |
---|---|---|
libvirt Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(0.7.5-5ubuntu27.16)
|
|
maverick |
Released
(0.8.3-1ubuntu19.1)
|
|
natty |
Released
(0.8.8-1ubuntu6.5)
|
|
upstream |
Released
(0.9.3, 0.9.2-7)
|
|
Patches: upstream: https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html vendor: https://rhn.redhat.com/errata/RHSA-2011-1019.html |