Описание
ELSA-2011-1019: libvirt security, bug fix, and enhancement update (MODERATE)
[0.8.2-22.0.1.el5]
- Replaced docs/et.png in tarball
[libvirt-0.8.2-22.el5]
- Fix auditing of disk hotunplug operations (rhbz#710151)
[libvirt-0.8.2-21.el5]
- remote: Protect against integer overflow (rhbz#717207)
[0.8.2-20.el5]
- Support enabling or disabling the HPET for Xen domains (rhbz#703193)
- SMBIOS support (rhbz#661365)
[0.8.2-19.el5]
- xen: Plug memory leak in multiple serial ports support (rhbz#670789)
- Manually kill gzip if restore fails before starting qemu (rhbz#681623)
- qemu: Avoid double close on domain restore (rhbz#681623)
- virterror: Avoid API breakage with vmware (rhbz#665075)
- nwfilter: Resolve deadlock between VM ops and filter update (rhbz#697749)
[0.8.2-18.el5]
- xen: Prevent updating device when attaching a device (rhbz#662908)
- Add PCI sysfs reset access (rhbz#689880)
- xencapstest: Don't fail when Xen is installed (rhbz#690459)
- Make error reporting in libvirtd thread safe (rhbz#690733)
[0.8.2-17.el5]
- Fix event-handling data race (rhbz#671569)
- Add support for multiple serial ports into the Xen driver (rhbz#670789)
- Add missing checks for read only connections (CVE-2011-1146)
- Guess rhel macro based on dist macro (rhbz#665325)
[0.8.2-16.el5]
- Fix possible crash in virExec (rhbz#665549)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
libvirt
0.8.2-22.0.1.el5
libvirt-devel
0.8.2-22.0.1.el5
libvirt-python
0.8.2-22.0.1.el5
Oracle Linux x86_64
libvirt
0.8.2-22.0.1.el5
libvirt-devel
0.8.2-22.0.1.el5
libvirt-python
0.8.2-22.0.1.el5
Oracle Linux i386
libvirt
0.8.2-22.0.1.el5
libvirt-devel
0.8.2-22.0.1.el5
libvirt-python
0.8.2-22.0.1.el5
Связанные CVE
Связанные уязвимости
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated u ...
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.