-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2014:097 http://www.mandriva.com/en/support/security/
Package : libvirt Date : May 16, 2014 Affected: Business Server 1.0
Multiple vulnerabilities has been discovered and corrected in libvirt:
The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to paths under /proc//root and the virInitctlSetRunLevel function (CVE-2013-6456).
libvirt was patched to prevent expansion of entities when parsing XML files. This vulnerability allowed malicious users to read arbitrary files or cause a denial of service (CVE-2014-0179).
The updated packages have been upgraded to the 184.108.40.206 version and patched to correct these issues.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179 http://security.libvirt.org/2014/0003.html http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
Mandriva Business Server 1/X86_64: d32a9d1b0e2f0d41fd38ca91678a14bd mbs1/x86_64/lib64virt0-220.127.116.11-1.mbs1.x86_64.rpm e808eb120fe42eba162c3be07bde1d60 mbs1/x86_64/lib64virt-devel-18.104.22.168-1.mbs1.x86_64.rpm 5957f991a7942b196a6754430c75e77c mbs1/x86_64/libvirt-utils-22.214.171.124-1.mbs1.x86_64.rpm 0787c1c3f963848334500deb9a4e8416 mbs1/x86_64/python-libvirt-126.96.36.199-1.mbs1.x86_64.rpm 1abef0303ae5d38c128a96cba3e7c589 mbs1/SRPMS/libvirt-188.8.131.52-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
If you want to report vulnerabilities, please contact
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTdelbmqjQ0CJFipgRAu7JAKCw9pUcJ0Ex3y4wHSVbqh6JXOPQ6gCgstCy jzarMyA06kq7pPYrm9T0a08= =12bW -----END PGP SIGNATURE-----