drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libvirt
Name: |
Mehrere Probleme in libvirt |
|
ID: |
FEDORA-2013-17618 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
Mi, 2. Oktober 2013, 10:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651 |
|
Applikationen: |
libvirt |
|
Originalnachricht |
Name : libvirt Product : Fedora 19 Version : 1.0.5.6 Release : 2.fc19 URL : http://libvirt.org/ Summary : Library providing a simple virtualization API Description : Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support.
------------------------------------------------------------------------------- - Update Information:
* Fix snapshot restore when VM has disabled usb support (bz #1011520) * Rebased to version 1.0.5.6 * Fix blockjobinfo python API (bz #999077) * CVE-2013-4311: Insecure polkit usage (bz #1009539, bz #1005332) * CVE-2013-4296: Invalid free memory stats (bz #1006173, bz #1009667) * CVE-2013-4291: Supplementary groups handling (bz #1006509, bz #1006511) * CVE-2013-5651: virBitmapParse out-of-bounds (bz #1006493) * Fix virsh change-media with block disk type (bz #951192) * Fix changing VNC listen address (bz #1006697) ------------------------------------------------------------------------------- - ChangeLog:
* Tue Sep 24 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.6-2 - Fix snapshot restore when VM has disabled usb support (bz #1011520) * Fri Sep 20 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.6-1 - Rebased to version 1.0.5.6 - Fix blockjobinfo python API (bz #999077) - CVE-2013-4311: Insecure polkit usage (bz #1009539, bz #1005332) - CVE-2013-4296: Invalid free memory stats (bz #1006173, bz #1009667) - CVE-2013-4291: Supplementary groups handling (bz #1006509, bz #1006511) - CVE-2013-5651: virBitmapParse out-of-bounds (bz #1006493) - Fix virsh change-media with block disk type (bz #951192) - Fix changing VNC listen address (bz #1006697) * Thu Aug 1 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.5-1 - Rebased to version 1.0.5.5 - Really fix /dev/tty inside a container (bz #982317) - Fix possible deadlock from getpwuid_r (bz #964358) * Fri Jul 12 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.4-1 - Rebased to version 1.0.5.4 - Fix crash on migration * Thu Jul 11 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.3-1 - Rebased to version 1.0.5.3 - Allow /dev/tty in LXC container (bz #982317) - Fix cpu hot-add with latest qemu (bz #979260) - Fix crash in udev logging (bz #969152) * Wed Jun 12 2013 Cole Robinson <crobinso@redhat.com> - 1.0.5.2-1 - Rebased to version 1.0.5.2 - Don't error if disk resize isn't multiple of 512 (bz #951495) - Fix racey cgroup error at VM startup (bz #965169) - Fix crash in nwfilter at daemon shutdown (bz #967740) - Fix 'tray is locked' error on media eject (bz #967914) - Error on invalid combo of --tunnelled and --copy-storage (bz #968043) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1005332 - CVE-2013-4311 libvirt: insecure calling of polkit https://bugzilla.redhat.com/show_bug.cgi?id=1005332 [ 2 ] Bug #1006173 - CVE-2013-4296 libvirt: invalid free in remoteDispatchDomainMemoryStats https://bugzilla.redhat.com/show_bug.cgi?id=1006173 [ 3 ] Bug #1006509 - CVE-2013-4291 libvirt: supplementary groups not adjusted correctly when parsing label https://bugzilla.redhat.com/show_bug.cgi?id=1006509 [ 4 ] Bug #1006493 - CVE-2013-5651 libvirt: virBitmapParse out-of-bounds read access https://bugzilla.redhat.com/show_bug.cgi?id=1006493 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libvirt' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|