Security update for libvirt

SUSE Security Update: Security update for libvirt
Announcement ID: SUSE-SU-2013:1641-1
Rating: moderate
References: #817008 #838638
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that solves one vulnerability and has one errata is now available.

    Description:


    This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix
    crash in remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display
    on SLES 11 SP2 UV2000

    Security Issue reference:

    * CVE-2013-4296
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-libvirt-8348
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-libvirt-8348
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-libvirt-8348

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • libvirt-devel-0.9.6-0.29.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (x86_64):
    • libvirt-devel-32bit-0.9.6-0.29.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • libvirt-0.9.6-0.29.1
    • libvirt-client-0.9.6-0.29.1
    • libvirt-doc-0.9.6-0.29.1
    • libvirt-python-0.9.6-0.29.1
    • SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
    • libvirt-client-32bit-0.9.6-0.29.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • libvirt-0.9.6-0.29.1
    • libvirt-client-0.9.6-0.29.1
    • libvirt-doc-0.9.6-0.29.1
    • libvirt-python-0.9.6-0.29.1
    • SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
    • libvirt-client-32bit-0.9.6-0.29.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-4296.html
    • https://bugzilla.novell.com/817008
    • https://bugzilla.novell.com/838638
    • http://download.suse.com/patch/finder/?keywords=11804d9ffe6f244a8a3ae7b0c74f0150