Описание
ELSA-2012-1359: libvirt security and bug fix update (MODERATE)
[libvirt-0.9.10-21.0.1.el6_3.5]
- Replace docs/et.png in tarball with blank image
[libvirt-0.9.10-21.el6_3.5]
- security: Fix libvirtd crash possibility (CVE-2012-4423)
- Fix augeas test of shared sanlock leases (rhbz#858988)
- qemu augeas: Add spice_tls/spice_tls_x509_cert_dir (rhbz#858988)
- Fix mistakes in augeas lens (rhbz#858988)
- qemu: Fix failure path in disk hotplug (rhbz#859376)
- blockjob: Relabel entire existing chain (rhbz#860720)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libvirt
0.9.10-21.0.1.el6_3.5
libvirt-client
0.9.10-21.0.1.el6_3.5
libvirt-devel
0.9.10-21.0.1.el6_3.5
libvirt-lock-sanlock
0.9.10-21.0.1.el6_3.5
libvirt-python
0.9.10-21.0.1.el6_3.5
Oracle Linux i686
libvirt
0.9.10-21.0.1.el6_3.5
libvirt-client
0.9.10-21.0.1.el6_3.5
libvirt-devel
0.9.10-21.0.1.el6_3.5
libvirt-python
0.9.10-21.0.1.el6_3.5
Связанные CVE
Связанные уязвимости
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 ...
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.