==========================================================================
Ubuntu Security Notice USN-2093-1
January 30, 2014
libvirt vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in libvirt.
Software Description:
– libvirt: Libvirt virtualization toolkit
Details:
Martin Kletzander discovered that libvirt incorrectly handled reading
memory tunables from LXC guests. A local user could possibly use this flaw
to cause libvirtd to crash, resulting in a denial of service. This issue
only affected Ubuntu 13.10. (CVE-2013-6436)
Dario Faggioli discovered that libvirt incorrectly handled the libxl
driver. A local user could possibly use this flaw to cause libvirtd to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 13.10. (CVE-2013-6457)
It was discovered that libvirt contained multiple race conditions in block
device handling. A remote read-only user could use this flaw to cause
libvirtd to crash, resulting in a denial of service. (CVE-2013-6458)
Eric Blake discovered that libvirt incorrectly handled certain ACLs. An
attacker could use this flaw to possibly obtain certain sensitive
information. This issue only affected Ubuntu 13.10. (CVE-2014-0028)
Jiri Denemark discovered that libvirt incorrectly handled keepalives. A
remote attacker could possibly use this flaw to cause libvirtd to crash,
resulting in a denial of service. (CVE-2014-1447)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
libvirt-bin 1.1.1-0ubuntu8.5
libvirt0 1.1.1-0ubuntu8.5
Ubuntu 12.10:
libvirt-bin 0.9.13-0ubuntu12.6
libvirt0 0.9.13-0ubuntu12.6
Ubuntu 12.04 LTS:
libvirt-bin 0.9.8-2ubuntu17.17
libvirt0 0.9.8-2ubuntu17.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2093-1
CVE-2013-6436, CVE-2013-6457, CVE-2013-6458, CVE-2014-0028,
CVE-2014-1447
Package Information:
https://launchpad.net/ubuntu/+source/libvirt/1.1.1-0ubuntu8.5
https://launchpad.net/ubuntu/+source/libvirt/0.9.13-0ubuntu12.6
https://launchpad.net/ubuntu/+source/libvirt/0.9.8-2ubuntu17.17
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.15 (GNU/Linux)
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/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=B1Pv
—–END PGP SIGNATURE—–
—