Name | CVE-2012-3445 |
Description | The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 683483 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libvirt (PTS) | jessie, jessie (lts) | 1.2.9-9+deb8u8 | fixed |
stretch (security) | 3.0.0-4+deb9u5 | fixed | |
stretch (lts), stretch | 3.0.0-4+deb9u6 | fixed | |
buster (security), buster, buster (lts) | 5.0.0-4+deb10u2 | fixed | |
bullseye | 7.0.0-3+deb11u3 | fixed | |
bookworm | 9.0.0-4+deb12u2 | fixed | |
sid, trixie | 10.9.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libvirt | source | squeeze | (not affected) | |||
libvirt | source | (unstable) | 0.9.12-4 | 683483 |
[squeeze] - libvirt <not-affected> (Vulnerable code not present)
https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html
https://bugzilla.redhat.com/show_bug.cgi?id=844734