libvirt is vulnerable to denial of service (DoS). The vulnerability exists as an integer overflow flaw was found in libvirtd’s RPC call handling. An attacker able to establish read-only connections to libvirtd could trigger this flaw by calling virDomainGetVcpus() with specially-crafted parameters, causing libvirtd to crash.
libvirt.org/news.html
lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
secunia.com/advisories/45375
secunia.com/advisories/45441
secunia.com/advisories/45446
www.debian.org/security/2011/dsa-2280
www.openwall.com/lists/oss-security/2011/06/28/9
www.redhat.com/support/errata/RHSA-2011-1019.html
www.redhat.com/support/errata/RHSA-2011-1197.html
www.securitytracker.com/id?1025822
www.ubuntu.com/usn/USN-1180-1
access.redhat.com/errata/RHSA-2011:1019
access.redhat.com/errata/RHSA-2011:1197
access.redhat.com/security/cve/CVE-2011-2511
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=717199
exchange.xforce.ibmcloud.com/vulnerabilities/68271
hermes.opensuse.org/messages/10027908
www.redhat.com/archives/libvir-list/2011-June/msg01278.html