Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html
https://hermes.opensuse.org/messages/10027908
https://exchange.xforce.ibmcloud.com/vulnerabilities/68271
http://www.ubuntu.com/usn/USN-1180-1
http://www.securitytracker.com/id?1025822
http://www.redhat.com/support/errata/RHSA-2011-1197.html
http://www.redhat.com/support/errata/RHSA-2011-1019.html
http://www.openwall.com/lists/oss-security/2011/06/28/9
http://www.debian.org/security/2011/dsa-2280
http://secunia.com/advisories/45446
http://secunia.com/advisories/45441
http://secunia.com/advisories/45375
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html