Описание
ELSA-2011-1197: libvirt security and bug fix update (MODERATE)
[0.8.7-18.0.1.el6_1.1 ]
- Replace docs/et.png in tarball with blank image
[libvirt-0.8.7-18.el6_1.1]
- debug: Avoid null dereference on uuid lookup api (rhbz#728546)
- Fix auditing of disk hotunplug operations (rhbz#728516)
- storage: Fix regression with backing format (rhbz#726617)
- Fix performance problem of virStorageVolCreateXMLFrom() (rhbz#715400)
- qemu: Translate boot config into bootindex if possible (rhbz#715401)
- remote: Protect against integer overflow (rhbz#717202) Resolves: rhbz#728546, rhbz#728516, rhbz#715400, rhbz#715401, rhbz#717202 Resolves: rhbz#726617
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libvirt
0.8.7-18.0.1.el6_1.1
libvirt-client
0.8.7-18.0.1.el6_1.1
libvirt-devel
0.8.7-18.0.1.el6_1.1
libvirt-python
0.8.7-18.0.1.el6_1.1
Oracle Linux i686
libvirt
0.8.7-18.0.1.el6_1.1
libvirt-client
0.8.7-18.0.1.el6_1.1
libvirt-devel
0.8.7-18.0.1.el6_1.1
libvirt-python
0.8.7-18.0.1.el6_1.1
Связанные CVE
Связанные уязвимости
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Integer overflow in libvirt before 0.9.3 allows remote authenticated u ...
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.