Bug Fix Advisory libnl bug fix update

Advisory: RHBA-2013:1730-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated libnl packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

The libnl packages contain a convenience library to simplify using the Linux
kernel's Netlink sockets interface for network manipulation.

This update fixes the following bugs:

* When a domain was started using the libvirt client libraries and utilities, a
memory leak was triggered from the libnl library because libnl continued to use
memory that was no longer in use. With this update, memory leaks in libnl are
fixed, and libnl releases memory after it completes its usage. (BZ#682240)

* Prior to this update, libnl's error handling made generous use of the
strerror() function. Nevertheless, the strerror() function was not threadsafe,
and it was possible for multiple threads in an application to call libnl. With
this update, all the occurrences of strerror() are replaced with a call to the
strerror_r() function that puts the message into a thread-local static buffer.
(BZ#689559)

* When the max_vfs parameter of the igb module, which allocates the maximum
number of Virtual Functions, was set to any value greater than 50,50 on a KVM
(Kernel-based Virtual Machine) host, the guest failed to start with the
following error messages:

error : virNetDevParseVfConfig:1484 : internal error missing
IFLA_VF_INFO in netlink response

error : virFileReadAll:457 : Failed to open file
'/var/run/libvirt/qemu/eth0_vf0': No such file or directory
error : virFileReadAll:457 : Failed to open file
'/var/run/libvirt/qemu/eth1_vf0': No such file or directory

This update increases the default receive buffer size to allow receiving of
Netlink messages that exceed the size of a memory page. Thus, guests are able to
start on the KVM host, and error messages no longer occur in the described
scenario. (BZ#953339)

Users of libnl are advised to upgrade to these updated packages, which fix these
bugs.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
libnl-1.1.4-2.el6.src.rpm     MD5: fd4e3f28df10aca338da3aa005deebb7
SHA-256: 97eb9038580a329760f38643231b5a9f3d068ac2d2e46a734217700589b424c8
 
IA-32:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
 
x86_64:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-1.1.4-2.el6.x86_64.rpm     MD5: 903f324142ddf4ab7ddcbfc35b58e904
SHA-256: fe60f9c1072eace8c09a99e4606cb59b412eda1d201f7ff10a06fb95ba4ed3c7
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-debuginfo-1.1.4-2.el6.x86_64.rpm     MD5: 9e64b5cdac90029a6703495ed5357a01
SHA-256: 0e92616d8a7cfbb6b5ff3087ea0f336255681e7b2a6dd67d5164ab02d2dd91b6
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
libnl-devel-1.1.4-2.el6.x86_64.rpm     MD5: 85038c6cf7d54476755a3ad22d33b8d1
SHA-256: 7b3b749044325b2b69cdcb64465841a492553e14c06fb7277a2208872d1bcae5
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
libnl-1.1.4-2.el6.src.rpm     MD5: fd4e3f28df10aca338da3aa005deebb7
SHA-256: 97eb9038580a329760f38643231b5a9f3d068ac2d2e46a734217700589b424c8
 
x86_64:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-1.1.4-2.el6.x86_64.rpm     MD5: 903f324142ddf4ab7ddcbfc35b58e904
SHA-256: fe60f9c1072eace8c09a99e4606cb59b412eda1d201f7ff10a06fb95ba4ed3c7
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-debuginfo-1.1.4-2.el6.x86_64.rpm     MD5: 9e64b5cdac90029a6703495ed5357a01
SHA-256: 0e92616d8a7cfbb6b5ff3087ea0f336255681e7b2a6dd67d5164ab02d2dd91b6
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
libnl-devel-1.1.4-2.el6.x86_64.rpm     MD5: 85038c6cf7d54476755a3ad22d33b8d1
SHA-256: 7b3b749044325b2b69cdcb64465841a492553e14c06fb7277a2208872d1bcae5
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
libnl-1.1.4-2.el6.src.rpm     MD5: fd4e3f28df10aca338da3aa005deebb7
SHA-256: 97eb9038580a329760f38643231b5a9f3d068ac2d2e46a734217700589b424c8
 
IA-32:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
 
PPC:
libnl-1.1.4-2.el6.ppc.rpm     MD5: bf07ae1390c7752b27ff78d0fcd6efc0
SHA-256: 47f6c8f577d19ea819016bdf39982ec339cece2778ea889345afb5a3ec21ec12
libnl-1.1.4-2.el6.ppc64.rpm     MD5: 08dff0b80bdc567dd838684b9135324e
SHA-256: f62b3e17a987944b58b2c471540890bb3e8195f5a20d0c59c1411b993a349e1c
libnl-debuginfo-1.1.4-2.el6.ppc.rpm     MD5: 807ed6b15de483f40a97895ce7e46bf5
SHA-256: 0292d69122b60c602604e6275a55145f254a2ebefe7849d589f332c0d449486e
libnl-debuginfo-1.1.4-2.el6.ppc64.rpm     MD5: 64f8117358acfee393289ccc532e2107
SHA-256: 64813d6bd0e5242505205593b9fa690710738880efd5e8984b166c5a0f61092e
libnl-devel-1.1.4-2.el6.ppc.rpm     MD5: a316346da6a9e1ce4fc074f6473d6278
SHA-256: 36de306731ff53eaa255fd59c2f42866a56527ade09112ddfc11e57f7956b3f6
libnl-devel-1.1.4-2.el6.ppc64.rpm     MD5: c75ef88b751f576cfab99c958b246e3a
SHA-256: 9fa3c99b9604995dc55adc2122199f4dffbb6f2071835c2e57298ff74ca6dbd7
 
s390x:
libnl-1.1.4-2.el6.s390.rpm     MD5: 8ccdd0c4684bc5415394a4e12676fec7
SHA-256: 8192bad0c0e61d868bb5cb0527c4b035cd393c4dd1a1ca6593a4e78661099f0f
libnl-1.1.4-2.el6.s390x.rpm     MD5: 251f2d3476f162a855d2cffcdf76a5c4
SHA-256: bb4bc5bad76c188606fc067b1286ae8145ea2a4a3e05a55b9fd41a9deb0227a0
libnl-debuginfo-1.1.4-2.el6.s390.rpm     MD5: 53acdcd5c7958c06984431806b59c6c7
SHA-256: 33fbd83767a3f27555ccc5ffd229b352d54ef31640e9c042cda538d4e5906c86
libnl-debuginfo-1.1.4-2.el6.s390x.rpm     MD5: e16e373a2bc8a1d6f67ffa3679b0f537
SHA-256: 5fc9129c6053cd1e96a7ab1a68586120dab2ac19b712db8a813a1a394a06567a
libnl-devel-1.1.4-2.el6.s390.rpm     MD5: c2b321afa42e17e82261a1344c8383c6
SHA-256: 72450b6f211182786a3bba7afb51e6147d5d52cdb61323734590ca363fb7431f
libnl-devel-1.1.4-2.el6.s390x.rpm     MD5: b689df2003c766cf79034d3b629c7f29
SHA-256: d58d16a5231b7ac4960f61509bea6d4f16e1215b396a4efa8037685507785bcc
 
x86_64:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-1.1.4-2.el6.x86_64.rpm     MD5: 903f324142ddf4ab7ddcbfc35b58e904
SHA-256: fe60f9c1072eace8c09a99e4606cb59b412eda1d201f7ff10a06fb95ba4ed3c7
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-debuginfo-1.1.4-2.el6.x86_64.rpm     MD5: 9e64b5cdac90029a6703495ed5357a01
SHA-256: 0e92616d8a7cfbb6b5ff3087ea0f336255681e7b2a6dd67d5164ab02d2dd91b6
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
libnl-devel-1.1.4-2.el6.x86_64.rpm     MD5: 85038c6cf7d54476755a3ad22d33b8d1
SHA-256: 7b3b749044325b2b69cdcb64465841a492553e14c06fb7277a2208872d1bcae5
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
libnl-1.1.4-2.el6.src.rpm     MD5: fd4e3f28df10aca338da3aa005deebb7
SHA-256: 97eb9038580a329760f38643231b5a9f3d068ac2d2e46a734217700589b424c8
 
IA-32:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
 
x86_64:
libnl-1.1.4-2.el6.i686.rpm     MD5: 6baa070cef1420b7ebd469428cfa02aa
SHA-256: f63e0a6c17ce06a02e81cf4631a590bf66e0932417b03b1718a832c2d8fc2d03
libnl-1.1.4-2.el6.x86_64.rpm     MD5: 903f324142ddf4ab7ddcbfc35b58e904
SHA-256: fe60f9c1072eace8c09a99e4606cb59b412eda1d201f7ff10a06fb95ba4ed3c7
libnl-debuginfo-1.1.4-2.el6.i686.rpm     MD5: 17618c0279ba775c377be800896f6b89
SHA-256: 56c87813a6e4d1bf549e364685f6f73ac801f8df23a55b21a33a7bc2c16645d5
libnl-debuginfo-1.1.4-2.el6.x86_64.rpm     MD5: 9e64b5cdac90029a6703495ed5357a01
SHA-256: 0e92616d8a7cfbb6b5ff3087ea0f336255681e7b2a6dd67d5164ab02d2dd91b6
libnl-devel-1.1.4-2.el6.i686.rpm     MD5: 262d2e448b06806e9769cd1eff3081eb
SHA-256: 20db21f92d0069dd7a81cece8ecfb7aa1ca6477d3b1c43f14cd8070e810b7e1c
libnl-devel-1.1.4-2.el6.x86_64.rpm     MD5: 85038c6cf7d54476755a3ad22d33b8d1
SHA-256: 7b3b749044325b2b69cdcb64465841a492553e14c06fb7277a2208872d1bcae5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

682240 - multiple memory leaks in libnl
689559 - libnl's error handling uses strerror, which is not threadsafe



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/