User: Password:
|
|
Subscribe / Log in / New account

Mandriva alert MDVSA-2014:097 (libvirt)

From:  security@mandriva.com
To:  security-announce@lists.mandriva.com
Subject:  [Security Announce] [ MDVSA-2014:097 ] libvirt
Date:  Fri, 16 May 2014 15:33:00 +0200
Message-ID:  <E1WlIFx-0003dO-An@titan.mandriva.com>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:097 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : libvirt Date : May 16, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in libvirt: The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to paths under /proc//root and the virInitctlSetRunLevel function (CVE-2013-6456). libvirt was patched to prevent expansion of entities when parsing XML files. This vulnerability allowed malicious users to read arbitrary files or cause a denial of service (CVE-2014-0179). The updated packages have been upgraded to the 1.1.3.5 version and patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179 http://security.libvirt.org/2014/0003.html http://lists.opensuse.org/opensuse-updates/2014-05/msg000... _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: d32a9d1b0e2f0d41fd38ca91678a14bd mbs1/x86_64/lib64virt0-1.1.3.5-1.mbs1.x86_64.rpm e808eb120fe42eba162c3be07bde1d60 mbs1/x86_64/lib64virt-devel-1.1.3.5-1.mbs1.x86_64.rpm 5957f991a7942b196a6754430c75e77c mbs1/x86_64/libvirt-utils-1.1.3.5-1.mbs1.x86_64.rpm 0787c1c3f963848334500deb9a4e8416 mbs1/x86_64/python-libvirt-1.1.3.5-1.mbs1.x86_64.rpm 1abef0303ae5d38c128a96cba3e7c589 mbs1/SRPMS/libvirt-1.1.3.5-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTdelbmqjQ0CJFipgRAu7JAKCw9pUcJ0Ex3y4wHSVbqh6JXOPQ6gCgstCy jzarMyA06kq7pPYrm9T0a08= =12bW -----END PGP SIGNATURE----- To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds