SUSE: 2019:0936-1 important: libvirt

    Date12 Apr 2019
    CategorySuSE
    212
    Posted ByLinuxSecurity Advisories
    An update that solves one vulnerability and has 15 fixes is now available.
    
       SUSE Security Update: Security update for libvirt
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:0936-1
    Rating:             important
    References:         #1081516 #1102604 #1104662 #1106420 #1108086 
                        #1108395 #1112182 #1117058 #1118952 #1120813 
                        #1123642 #1124667 #1125665 #1126325 #1127458 
                        #1130129 
    Cross-References:   CVE-2019-3840
    Affected Products:
                        SUSE Linux Enterprise Module for Server Applications 15
                        SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
                        SUSE Linux Enterprise Module for Basesystem 15
    ______________________________________________________________________________
    
       An update that solves one vulnerability and has 15 fixes is
       now available.
    
    Description:
    
       This update for libvirt provides the following fixes:
    
       Security issue fixed:
    
       - CVE-2019-3840: Fixed a null pointer dereference vulnerability in
         virJSONValueObjectHasKey function which could have resulted in a remote
         denial of service via the guest agent (bsc#1127458).
    
       Other issues addressed:
    
       - apparmor: reintroduce upstream lxc mount rules (bsc#1130129).
       - hook: encode incoming XML to UTF-8 before passing to lxml etree from
         string method (bsc#1123642).
       - supportconfig: collect rotated logs in /var/log/libvirt/* (bsc#1124667).
       - libxl: support Xen's max_grant_frames setting with maxGrantFrames
         attribute on the xenbus controller (bsc#1126325).
       - conf: added new 'xenbus' controller type
       - util: skip RDMA detection for non-PCI network devices (bsc#1112182).
       - qemu: don't use CAP_DAC_OVERRIDE capability if non-root (bsc#1125665).
       - qemu: fix issues related to restricted permissions on
         /dev/sev(bsc#1102604).
       - apparmor: add support for named profiles (bsc#1118952).
       - libxl: save current memory value after successful balloon (bsc#1120813).
       - apparmor: Fix ptrace rules. (bsc#1117058)
       - libxl: Add support for soft reset. (bsc#1081516)
       - libxl: Fix VM migration on busy hosts. (bsc#1108086)
       - qemu: Add support for SEV guests. (fate#325817)
       - util: Don't check for parallel iteration in hash-related functions.
         (bsc#1106420)
       - spec: Don't restart libvirt-guests when updating libvirt-client.
         (bsc#1104662)
       - Fix virNodeGetSEVInfo API crashing libvirtd on AMD SEV enabled hosts.
         (bsc#1108395)
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Module for Server Applications 15:
    
          zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-936=1
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    
          zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-936=1
    
       - SUSE Linux Enterprise Module for Basesystem 15:
    
          zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-936=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Module for Server Applications 15 (aarch64 ppc64le s390x x86_64):
    
          libvirt-4.0.0-9.16.7
          libvirt-admin-4.0.0-9.16.7
          libvirt-admin-debuginfo-4.0.0-9.16.7
          libvirt-client-4.0.0-9.16.7
          libvirt-client-debuginfo-4.0.0-9.16.7
          libvirt-daemon-4.0.0-9.16.7
          libvirt-daemon-config-network-4.0.0-9.16.7
          libvirt-daemon-config-nwfilter-4.0.0-9.16.7
          libvirt-daemon-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-interface-4.0.0-9.16.7
          libvirt-daemon-driver-interface-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-lxc-4.0.0-9.16.7
          libvirt-daemon-driver-lxc-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-network-4.0.0-9.16.7
          libvirt-daemon-driver-network-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-nodedev-4.0.0-9.16.7
          libvirt-daemon-driver-nodedev-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-nwfilter-4.0.0-9.16.7
          libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-qemu-4.0.0-9.16.7
          libvirt-daemon-driver-qemu-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-secret-4.0.0-9.16.7
          libvirt-daemon-driver-secret-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-4.0.0-9.16.7
          libvirt-daemon-driver-storage-core-4.0.0-9.16.7
          libvirt-daemon-driver-storage-core-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-disk-4.0.0-9.16.7
          libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-iscsi-4.0.0-9.16.7
          libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-logical-4.0.0-9.16.7
          libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-mpath-4.0.0-9.16.7
          libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-9.16.7
          libvirt-daemon-driver-storage-scsi-4.0.0-9.16.7
          libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-9.16.7
          libvirt-daemon-hooks-4.0.0-9.16.7
          libvirt-daemon-lxc-4.0.0-9.16.7
          libvirt-daemon-qemu-4.0.0-9.16.7
          libvirt-debugsource-4.0.0-9.16.7
          libvirt-devel-4.0.0-9.16.7
          libvirt-doc-4.0.0-9.16.7
          libvirt-lock-sanlock-4.0.0-9.16.7
          libvirt-lock-sanlock-debuginfo-4.0.0-9.16.7
          libvirt-nss-4.0.0-9.16.7
          libvirt-nss-debuginfo-4.0.0-9.16.7
    
       - SUSE Linux Enterprise Module for Server Applications 15 (aarch64 x86_64):
    
          libvirt-daemon-driver-storage-rbd-4.0.0-9.16.7
          libvirt-daemon-driver-storage-rbd-debuginfo-4.0.0-9.16.7
    
       - SUSE Linux Enterprise Module for Server Applications 15 (x86_64):
    
          libvirt-daemon-driver-libxl-4.0.0-9.16.7
          libvirt-daemon-driver-libxl-debuginfo-4.0.0-9.16.7
          libvirt-daemon-xen-4.0.0-9.16.7
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
    
          libvirt-debugsource-4.0.0-9.16.7
          wireshark-plugin-libvirt-4.0.0-9.16.7
          wireshark-plugin-libvirt-debuginfo-4.0.0-9.16.7
    
       - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):
    
          libvirt-debugsource-4.0.0-9.16.7
          libvirt-libs-4.0.0-9.16.7
          libvirt-libs-debuginfo-4.0.0-9.16.7
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-3840.html
       https://bugzilla.suse.com/1081516
       https://bugzilla.suse.com/1102604
       https://bugzilla.suse.com/1104662
       https://bugzilla.suse.com/1106420
       https://bugzilla.suse.com/1108086
       https://bugzilla.suse.com/1108395
       https://bugzilla.suse.com/1112182
       https://bugzilla.suse.com/1117058
       https://bugzilla.suse.com/1118952
       https://bugzilla.suse.com/1120813
       https://bugzilla.suse.com/1123642
       https://bugzilla.suse.com/1124667
       https://bugzilla.suse.com/1125665
       https://bugzilla.suse.com/1126325
       https://bugzilla.suse.com/1127458
       https://bugzilla.suse.com/1130129
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://lists.suse.com/mailman/listinfo/sle-security-updates
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"5","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.