Fedora 31: libvirt FEDORA-2020-5cd83efda7
Summary
Libvirt is a C toolkit to interact with the virtualization capabilities
of recent versions of Linux (and other OSes). The main package includes
the libvirtd server exporting the virtualization support.
* Fix iptables No chain/target/match by that name (bz #1813830) * systemd: start
libvirtd after firewalld/iptables services (bz #1697636) * CVE-2020-12430:
memory leak in domstats may allow read-only user to perform DoS attack (bz
#1828216, bz #1828190) * CVE-2020-10703: Potential denial of service via active
pool without target path (bz #1820690, bz #1816650) * CVE-2019-20485: potential
DoS by holding a monitor job while querying QEMU guest-agent (bz #1809741, bz
#1809740)
* Wed May 27 2020 Cole Robinson
- Fix iptables No chain/target/match by that name (bz #1813830)
- systemd: start libvirtd after firewalld/iptables services (bz #1697636)
- CVE-2020-12430: memory leak in domstats may allow read-only user to
perform DoS attack (bz #1828216, bz #1828190)
- CVE-2020-10703: Potential denial of service via active pool without target
path (bz #1820690, bz #1816650)
- CVE-2019-20485: potential DoS by holding a monitor job while querying QEMU
guest-agent (bz #1809741, bz #1809740)
* Tue Apr 7 2020 Cole Robinson
- Fix issues with uptime detection (bz #1783715)
* Mon Nov 11 2019 Cole Robinson
- Don't re-autostart objects when using socket activation (bz #1759613)
- set bridge device MAC address explicitly (bz #1760851)
[ 1 ] Bug #1809740 - CVE-2019-20485 Libvirt: potential DoS by holding a monitor job while querying QEMU guest-agent
https://bugzilla.redhat.com/show_bug.cgi?id=1809740
[ 2 ] Bug #1816650 - CVE-2020-10703 libvirt: Potential denial of service via active pool without target path
https://bugzilla.redhat.com/show_bug.cgi?id=1816650
[ 3 ] Bug #1828190 - CVE-2020-12430 libvirt: memory leak in domstats may allow read-only user to perform DoS attack
https://bugzilla.redhat.com/show_bug.cgi?id=1828190
su -c 'dnf upgrade --advisory FEDORA-2020-5cd83efda7' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Change Log
References