Red Hat Bugzilla – Bug 484947
CVE-2009-0036 libvirt: libvirt_proxy buffer overflow
Last modified: 2011-05-05 04:44:54 EDT
A buffer overflow flaw was found in libvirt_proxy. libvirt_proxy is set to
run as a setuid root by default, so in theory this could allow for a local
user to become root.
Normally the stack protector would prevent this from being an issue, but it
seems that with gcc optimizations, the function in question is being
inlined into main(), preventing the stack protector from catching this.
The original report can be found here:
The patch is here:
This issue has been addressed in following products:
Red Hat Enterprise Linux 5
Via RHSA-2009:0382 https://rhn.redhat.com/errata/RHSA-2009-0382.html
This issue was addressed in:
Red Hat Enterprise Linux: