Security update for libvirt

SUSE Security Update: Security update for libvirt
Announcement ID: SUSE-SU-2017:2660-1
Rating: moderate
References: #1025340 #1026236 #1053600
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11-SP4
  • SUSE Linux Enterprise Server 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

  • An update that contains security fixes can now be installed.

    Description:

    This update for libvirt fixes several issues.

    This security issue was fixed:

    - bsc#1053600: Escape ssh commed line to prevent interpreting malicious
    hostname as arguments, allowing for command execution

    These non-security issues were fixed:

    - bsc#1025340: Use xend for nodeGetFreeMemory API
    - bsc#1026236: Add support for tsc timers on xen

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11-SP4:
      zypper in -t patch sdksp4-libvirt-13297=1
    • SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-libvirt-13297=1
    • SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-libvirt-13297=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • libvirt-devel-1.2.5-23.3.1
    • SUSE Linux Enterprise Software Development Kit 11-SP4 (x86_64):
      • libvirt-devel-32bit-1.2.5-23.3.1
    • SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • libvirt-1.2.5-23.3.1
      • libvirt-client-1.2.5-23.3.1
      • libvirt-doc-1.2.5-23.3.1
      • libvirt-lock-sanlock-1.2.5-23.3.1
    • SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
      • libvirt-client-32bit-1.2.5-23.3.1
    • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • libvirt-debuginfo-1.2.5-23.3.1
      • libvirt-debugsource-1.2.5-23.3.1

    References: