Описание
Security update for libvirt
This update for libvirt fixes the following issues:
Security issues fixed:
- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which could have been used to execute arbitrary emulators (bsc#1138303).
Non-security issues fixed:
- Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734).
- Added support for overriding max threads per process limit (bsc#1133719)
Список пакетов
SUSE Enterprise Storage 5
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-LTSS
Ссылки
- Link for SUSE-SU-2019:2227-2
- E-Mail link for SUSE-SU-2019:2227-2
- SUSE Security Ratings
- SUSE Bug 1133719
- SUSE Bug 1138301
- SUSE Bug 1138303
- SUSE Bug 1138734
- SUSE CVE CVE-2019-10161 page
- SUSE CVE CVE-2019-10167 page
Описание
It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
Затронутые продукты
Ссылки
- CVE-2019-10161
- SUSE Bug 1138301
Описание
The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
Затронутые продукты
Ссылки
- CVE-2019-10167
- SUSE Bug 1138303