Описание
Security update for libvirt
This update for libvirt fixes the following issues:
Security issues fixed:
- CVE-2021-3631: fix SELinux label generation logic (bsc#1187871)
- CVE-2021-3667: Unlock object on ACL fail in storagePoolLookupByTargetPath (bsc#1188843)
Non-security issues fixed:
- virtlockd: Don't report error if lockspace exists (bsc#1184253)
- Don't forcibly remove '--listen' arg from /etc/sysconfig/libvirtd. Add '--timeout 120' if '--listen' is not specified. (bsc#1188232)
Список пакетов
Container suse/sles/15.3/libguestfs-tools:0.45.0
Container suse/sles/15.3/virt-handler:0.45.0
Container suse/sles/15.3/virt-launcher:0.45.0
Image SLES15-SP3-SAP-BYOS-Azure
Image SLES15-SP3-SAP-BYOS-EC2-HVM
Image SLES15-SP3-SAP-BYOS-GCE
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Server Applications 15 SP3
Ссылки
- Link for SUSE-SU-2021:2812-1
- E-Mail link for SUSE-SU-2021:2812-1
- SUSE Security Ratings
- SUSE Bug 1184253
- SUSE Bug 1187871
- SUSE Bug 1188232
- SUSE Bug 1188843
- SUSE CVE CVE-2021-3631 page
- SUSE CVE CVE-2021-3667 page
Описание
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
Затронутые продукты
Ссылки
- CVE-2021-3631
- SUSE Bug 1187871
Описание
An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
Затронутые продукты
Ссылки
- CVE-2021-3667
- SUSE Bug 1188843