Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Sep 2012 18:51:00 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request -- libvirt: null function pointer invocation in
 virNetServerProgramDispatchCall()

It has been found that sending RPC message with an event as the RPC
number, or RPC number that falls into gap in the RPC dispatch table, can
lead to libvirtd accessing memory at page zero. A remote attacker could
use this flaw to crash libvirtd (DoS).

Proposed upstream fix:
https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html

References:
https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html
https://bugzilla.redhat.com/show_bug.cgi?id=857133

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.