SciLinux: Important: libvirt on SL7.x x86_64

    Date15 May 2019
    149
    Posted ByLinuxSecurity Advisories
    A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data [More...]
    Synopsis: Important: libvirt security update
    Advisory ID:       SLSA-2019:1177-1
    Issue Date:        2019-05-14
    CVE Numbers:       CVE-2018-12126
                       CVE-2018-12130
                       CVE-2018-12127
                       CVE-2019-11091
    --
    
    Security Fix(es):
    
    * A flaw was found in the implementation of the "fill buffer", a mechanism
    used by modern CPUs when a cache-miss is made on L1 CPU cache. If an
    attacker can generate a load operation that would create a page fault, the
    execution will continue speculatively with incorrect data from the fill
    buffer while the data is fetched from higher level caches. This response
    time can be measured to infer data in the fill buffer. (CVE-2018-12130)
    
    * Modern Intel microprocessors implement hardware-level micro-
    optimizations to improve the performance of writing data back to CPU
    caches. The write operation is split into STA (STore Address) and STD
    (STore Data) sub-operations. These sub-operations allow the processor to
    hand-off address generation logic into these sub-operations for optimized
    writes. Both of these sub-operations write to a shared distributed
    processor structure called the 'processor store buffer'. As a result, an
    unprivileged attacker could use this flaw to read private data resident
    within the CPU's processor store buffer. (CVE-2018-12126)
    
    * Microprocessors use a load port subcomponent to perform load operations
    from memory or IO. During a load operation, the load port receives data
    from the memory or IO subsystem and then provides the data to the CPU
    registers and operations in the CPUs pipelines. Stale load operations
    results are stored in the 'load port' table until overwritten by newer
    operations. Certain load-port operations triggered by an attacker can be
    used to reveal data about previous stale requests leaking data back to the
    attacker via a timing side-channel. (CVE-2018-12127)
    
    * Uncacheable memory on some microprocessors utilizing speculative
    execution may allow an authenticated user to potentially enable
    information disclosure via a side channel with local access.
    (CVE-2019-11091)
    --
    
    SL7
      x86_64
        libvirt-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-client-4.5.0-10.el7_6.9.i686.rpm
        libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-debuginfo-4.5.0-10.el7_6.9.i686.rpm
        libvirt-debuginfo-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-libs-4.5.0-10.el7_6.9.i686.rpm
        libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-devel-4.5.0-10.el7_6.9.i686.rpm
        libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-nss-4.5.0-10.el7_6.9.i686.rpm
        libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm
        libvirt-4.5.0-10.el7_6.9.src.rpm
    
    - Scientific Linux Development Team
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    In your opinion, what is the biggest advantage associated with choosing open-source software/technology?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote
    16
    radio
    [{"id":"61","title":"High levels of security","votes":"1","type":"x","order":"1","pct":16.67,"resources":[]},{"id":"62","title":"High levels of quality ","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"63","title":"Cost-effectiveness ","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"64","title":"Freedom and flexibility ","votes":"5","type":"x","order":"4","pct":83.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.