SUSE: 2019:14146-1 moderate: libvirt and libvirt-python
Summary
This update for libvirt and libvirt-python fixes the following issues: libvirt: - CVE-2016-10746: Fixed an authentication bypass where a guest agent with a read only connection could call virDomainGetTime API calls (bsc#1133150). - rpc: increase the size of REMOTE_MIGRATE_COOKIE_MAX (bsc#1134783). libvirt-python: - Fixes a memory leak in libvirt-python (bsc#1140252) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-libvirt-python-14146=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libvirt-python-14146=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64): libvirt-1.2.5-23.24.1 libvirt-client-1.2.5-23.24.1 libvirt-doc-1.2.5-23.24.1 libvirt-lock-sanlock-1.2.5-23.24.1 libvirt-python-1.2.5-3.3.2 - SUSE Linux Enterprise Server 11-SP4-LTSS (ppc64 s390x x86_64): libvirt-client-32bit-1.2.5-23.24.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64): libvirt-debuginfo-1.2.5-23.24.1 libvirt-debugsource-1.2.5-23.24.1 libvirt-python-debuginfo-1.2.5-3.3.2 libvirt-python-debugsource-1.2.5-3.3.2
References
#1133150 #1134783 #1140252
Cross- CVE-2016-10746
Affected Products:
SUSE Linux Enterprise Server 11-SP4-LTSS
SUSE Linux Enterprise Debuginfo 11-SP4
https://www.suse.com/security/cve/CVE-2016-10746.html
https://bugzilla.suse.com/1133150
https://bugzilla.suse.com/1134783
https://bugzilla.suse.com/1140252