SUSE Security Update: Security update for libvirt and libvirt-python
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:14146-1
Rating:             moderate
References:         #1133150 #1134783 #1140252 
Cross-References:   CVE-2016-10746
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for libvirt and libvirt-python fixes the following issues:

   libvirt:

   - CVE-2016-10746: Fixed an authentication bypass where a guest agent with
     a read only connection could call virDomainGetTime API calls
     (bsc#1133150).
   - rpc: increase the size of REMOTE_MIGRATE_COOKIE_MAX (bsc#1134783).

   libvirt-python:

   - Fixes a memory leak in libvirt-python (bsc#1140252)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-libvirt-python-14146=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-libvirt-python-14146=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):

      libvirt-1.2.5-23.24.1
      libvirt-client-1.2.5-23.24.1
      libvirt-doc-1.2.5-23.24.1
      libvirt-lock-sanlock-1.2.5-23.24.1
      libvirt-python-1.2.5-3.3.2

   - SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64 s390x x86_64):

      libvirt-client-32bit-1.2.5-23.24.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):

      libvirt-debuginfo-1.2.5-23.24.1
      libvirt-debugsource-1.2.5-23.24.1
      libvirt-python-debuginfo-1.2.5-3.3.2
      libvirt-python-debugsource-1.2.5-3.3.2


References:

   https://www.suse.com/security/cve/CVE-2016-10746.html
   https://bugzilla.suse.com/1133150
   https://bugzilla.suse.com/1134783
   https://bugzilla.suse.com/1140252

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:14146-1 moderate: libvirt and libvirt-python

August 15, 2019
An update that solves one vulnerability and has two fixes is now available

Summary

This update for libvirt and libvirt-python fixes the following issues: libvirt: - CVE-2016-10746: Fixed an authentication bypass where a guest agent with a read only connection could call virDomainGetTime API calls (bsc#1133150). - rpc: increase the size of REMOTE_MIGRATE_COOKIE_MAX (bsc#1134783). libvirt-python: - Fixes a memory leak in libvirt-python (bsc#1140252) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-libvirt-python-14146=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libvirt-python-14146=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64): libvirt-1.2.5-23.24.1 libvirt-client-1.2.5-23.24.1 libvirt-doc-1.2.5-23.24.1 libvirt-lock-sanlock-1.2.5-23.24.1 libvirt-python-1.2.5-3.3.2 - SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64 s390x x86_64): libvirt-client-32bit-1.2.5-23.24.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64): libvirt-debuginfo-1.2.5-23.24.1 libvirt-debugsource-1.2.5-23.24.1 libvirt-python-debuginfo-1.2.5-3.3.2 libvirt-python-debugsource-1.2.5-3.3.2

References

#1133150 #1134783 #1140252

Cross- CVE-2016-10746

Affected Products:

SUSE Linux Enterprise Server 11-SP4-LTSS

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2016-10746.html

https://bugzilla.suse.com/1133150

https://bugzilla.suse.com/1134783

https://bugzilla.suse.com/1140252

Severity
Announcement ID: SUSE-SU-2019:14146-1
Rating: moderate

Related News