| Summary: | libvirt new security issue CVE-2020-15708 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Thierry Vignaud <thierry.vignaud> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | mageia |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | libvirt-6.5.0-1.mga8.src.rpm | CVE: | |
| Status comment: | Patch available from openSUSE | ||
|
Description
David Walser
2020-08-05 00:25:35 CEST
SUSE has issued an advisory for this on October 26: https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html openSUSE has issued an advisory for this today (October 31): https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html SUSE noted that 0666 is the correct mode if polkit auth is enabled, which it is by default in SUSE and Mageia. SUSE added a patch to the config (where the auth mode can be changed) to note that if the auth mode is changed, the libvirtd.socket file needs to be changed: https://build.opensuse.org/package/view_file/openSUSE:Leap:15.2:Update/libvirt/b196f8fc-CVE-2020-15708-doc.patch?expand=1 We should do the same. Status comment:
(none) =>
Patch available from openSUSE added in our cauldron package Resolution:
(none) =>
FIXED |