Mageia 2019-0390: libvirt security update
Summary
Updated libvirt packages fix security vulnerabilities:
An information leak which allowed to retrieve the guest hostname
under readonly mode (CVE-2019-3886).
Wrong permissions in systemd admin-sock due to missing SocketMode
parameter (CVE-2019-10132).
Arbitrary file read/exec via virDomainSaveImageGetXMLDesc API
(CVE-2019-10161).
virDomainManagedSaveDefineXML API exposed to readonly clients
(CVE-2019-10166).
Arbitrary command execution via virConnectGetDomainCapabilities API
(CVE-2019-10167).
Arbitrary command execution via virConnectBaselineHypervisorCPU and
virConnectCompareHypervisorCPU APIs (CVE-2019-10168).
Also, this update contains the libvirt adjustments, that pass through
the new 'md-clear' CPU flag, to help address Intel CPU speculative
execution flaws.
References
- https://bugs.mageia.org/show_bug.cgi?id=24757
- - https://access.redhat.com/errata/RHSA-2019:1264
- https://access.redhat.com/errata/RHSA-2019:1579
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168
Resolution
MGASA-2019-0390 - Updated libvirt packages fix security vulnerabilities
SRPMS
- 7/core/libvirt-5.5.0-1.mga7
- 7/core/python-libvirt-5.5.0-1.mga7