Synopsis: Low: libvirt security and bug fix update
Advisory ID: SLSA-2018:1396-1
Issue Date: 2018-05-15
CVE Numbers: CVE-2018-5748
* libvirt: Resource exhaustion via qemuMonitorIORead() method
* libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent
The CVE-2018-1064 issue was discovered by Daniel P. Berrang (Red Hat) and
the CVE-2018-5748 issue was discovered by Daniel P. Berrange (Red Hat) and
Peter Krempa (Red Hat).
* Previously, the check for a non-unique device boot order did not
properly handle updates of existing devices when a new device was attached
to a guest. Consequently, updating any device with a specified boot order
failed. With this update, the duplicity check detects correctly handles
updates and ignores the original device, which avoids reporting false
conflicts. As a result, updating a device with a boot order succeeds.
* In Scientific Linux 7.5, guests with SCSI passthrough enabled failed to
boot because of changes in kernel CGroup detection. With this update,
libvirt fetches dependencies and adds them to the device CGroup. As a
result, and the affected guests now start as expected.
* The VMX parser in libvirt did not parse more than four network
interfaces. As a consequence, the esx driver did not expose more than four
network interface cards (NICs) for guests running ESXi. With this update,
the VMX parser parses all the available NICs in .vmx files. As a result,
libvirt reports all the NICs of guests running ESXi.
* Previously, user aliases for PTY devices that were longer than 32
characters were not supported. Consequently, if a domain included a PTY
device with a user alias longer than 32 characters, the domain would not
start. With this update, a static buffer was replaced with a dynamic
buffer. As a result, the domain starts even if the length of the user
alias for a PTY device is longer than 32 characters.
– Scientific Linux Development Team