Hide Forgot
A buffer overflow flaw was found in libvirt_proxy. libvirt_proxy is set to run as a setuid root by default, so in theory this could allow for a local user to become root. Normally the stack protector would prevent this from being an issue, but it seems that with gcc optimizations, the function in question is being inlined into main(), preventing the stack protector from catching this. The original report can be found here: https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html The patch is here: http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:0382 https://rhn.redhat.com/errata/RHSA-2009-0382.html
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2009-0382.html