openSUSE Security Update : libvirt (openSUSE-2016-82)

low Nessus Plugin ID 88395

Synopsis

The remote openSUSE host is missing a security update.

Description

Maintenance update for openSUSE13.1 libvirt package.

- Fix cve-2015-5313: directory directory traversal privilege escalation vulnerability.
e8643ef6-cve-2015-5313.patch bsc#953110

- qemu: Call qemuSetupHostdevCGroup later during hotplug 05e149f9-call-qemuSetupHostdevCGroup-later.patch qemu:
hotplug: Only label hostdev after checking device conflicts ee414b5d-fix-qemu-hotplug-usb-hostdev.patch bsc#863933

- libxl: support virtual sound devices in HVM domains c0d3f608-libxl-soundhw.patch bsc#875216

Solution

Update the affected libvirt packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=863933

https://bugzilla.opensuse.org/show_bug.cgi?id=875216

https://bugzilla.opensuse.org/show_bug.cgi?id=953110

Plugin Details

Severity: Low

ID: 88395

File Name: openSUSE-2016-82.nasl

Version: 2.5

Type: local

Agent: unix

Published: 1/27/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 2.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvirt, p-cpe:/a:novell:opensuse:libvirt-client, p-cpe:/a:novell:opensuse:libvirt-client-32bit, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit, p-cpe:/a:novell:opensuse:libvirt-daemon, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-uml, p-cpe:/a:novell:opensuse:libvirt-daemon-vbox, p-cpe:/a:novell:opensuse:libvirt-daemon-xen, p-cpe:/a:novell:opensuse:libvirt-debugsource, p-cpe:/a:novell:opensuse:libvirt-devel, p-cpe:/a:novell:opensuse:libvirt-devel-32bit, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo, p-cpe:/a:novell:opensuse:libvirt-login-shell, p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo, p-cpe:/a:novell:opensuse:libvirt-python, p-cpe:/a:novell:opensuse:libvirt-python-debuginfo, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:libvirt-daemon-config-network, p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter, p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/24/2016

Reference Information

CVE: CVE-2015-5313