openSUSE Security Update : libvirt (openSUSE-SU-2014:0593-1)

medium Nessus Plugin ID 75338

Synopsis

The remote openSUSE host is missing a security update.

Description

libvirt was updated to fix various bugs and security issues :

CVE-2013-7336: libvirt: unprivileged user can crash libvirtd during spice migration

CVE-2013-6456: unsafe usage of paths under /proc/$PID/root

Bugfixes for libvirt client killed on reboot shutdown. (bnc#852005)

Also notify systemd when we are ready to accept connections.

Solution

Update the affected libvirt packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=852005

https://bugzilla.novell.com/show_bug.cgi?id=857490

https://bugzilla.novell.com/show_bug.cgi?id=868943

https://bugzilla.novell.com/show_bug.cgi?id=871154

https://bugzilla.novell.com/show_bug.cgi?id=873103

https://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html

Plugin Details

Severity: Medium

ID: 75338

File Name: openSUSE-2014-328.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvirt-daemon, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl, p-cpe:/a:novell:opensuse:libvirt-daemon-uml, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo, p-cpe:/a:novell:opensuse:libvirt-python-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret, p-cpe:/a:novell:opensuse:libvirt-login-shell, p-cpe:/a:novell:opensuse:libvirt, p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-config-network, p-cpe:/a:novell:opensuse:libvirt-debugsource, p-cpe:/a:novell:opensuse:libvirt-devel-32bit, p-cpe:/a:novell:opensuse:libvirt-client-32bit, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage, p-cpe:/a:novell:opensuse:libvirt-devel, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-vbox, p-cpe:/a:novell:opensuse:libvirt-python, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter, p-cpe:/a:novell:opensuse:libvirt-client, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev, p-cpe:/a:novell:opensuse:libvirt-daemon-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock, p-cpe:/a:novell:opensuse:libvirt-daemon-xen, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 4/23/2014

Reference Information

CVE: CVE-2013-6456, CVE-2013-7336