SUSE Security Update: Security update for libvirt
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2141-1
Rating:             important
References:         #1076500 #1079869 #1083625 #1092885 #854343 
                    #897352 #954872 #956298 #964465 #968483 #980558 
                    #987527 
Cross-References:   CVE-2016-5008 CVE-2017-5715 CVE-2018-1064
                    CVE-2018-3639 CVE-2018-5748
Affected Products:
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has 7 fixes is
   now available.

Description:

   This update for libvirt fixes the following issues:

   Security issues fixed:

   - CVE-2018-3639: Add support for 'ssbd' and 'virt-ssbd' CPUID feature bits
     to address V4 Speculative Store Bypass aka "Memory Disambiguation"
     (bsc#1092885).
   - CVE-2018-1064: Fix denial of service problem during reading from guest
     agent (bsc#1083625).
   - CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method
     (bsc#1076500).
   - CVE-2016-5008: Fix that an empty VNC password disables authentication
     (bsc#987527).
   - CVE-2017-5715: Fix speculative side channel attacks aka "SpectreAttack"
     (var2) (bsc#1079869).

   Bug fixes:

   - bsc#980558: Fix NUMA node memory allocation.
   - bsc#968483: Restart daemons in %posttrans after connection drivers.
   - bsc#897352: Systemd fails to ignore LSB services.
   - bsc#956298: virsh domxml-to-native causes segfault of libvirtd.
   - bsc#964465: libvirtd.service causes systemd warning about xencommons
     service.
   - bsc#954872: Script block-dmmd not working as expected.
   - bsc#854343: libvirt installation run inappropriate systemd restart.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2018-1455=1



Package List:

   - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

      libvirt-1.2.5-27.13.1
      libvirt-client-1.2.5-27.13.1
      libvirt-client-debuginfo-1.2.5-27.13.1
      libvirt-daemon-1.2.5-27.13.1
      libvirt-daemon-config-network-1.2.5-27.13.1
      libvirt-daemon-config-nwfilter-1.2.5-27.13.1
      libvirt-daemon-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-interface-1.2.5-27.13.1
      libvirt-daemon-driver-interface-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-lxc-1.2.5-27.13.1
      libvirt-daemon-driver-lxc-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-network-1.2.5-27.13.1
      libvirt-daemon-driver-network-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-nodedev-1.2.5-27.13.1
      libvirt-daemon-driver-nodedev-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-nwfilter-1.2.5-27.13.1
      libvirt-daemon-driver-nwfilter-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-qemu-1.2.5-27.13.1
      libvirt-daemon-driver-qemu-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-secret-1.2.5-27.13.1
      libvirt-daemon-driver-secret-debuginfo-1.2.5-27.13.1
      libvirt-daemon-driver-storage-1.2.5-27.13.1
      libvirt-daemon-driver-storage-debuginfo-1.2.5-27.13.1
      libvirt-daemon-lxc-1.2.5-27.13.1
      libvirt-daemon-qemu-1.2.5-27.13.1
      libvirt-debugsource-1.2.5-27.13.1
      libvirt-doc-1.2.5-27.13.1
      libvirt-lock-sanlock-1.2.5-27.13.1
      libvirt-lock-sanlock-debuginfo-1.2.5-27.13.1

   - SUSE Linux Enterprise Server 12-LTSS (x86_64):

      libvirt-daemon-driver-libxl-1.2.5-27.13.1
      libvirt-daemon-driver-libxl-debuginfo-1.2.5-27.13.1
      libvirt-daemon-xen-1.2.5-27.13.1


References:

   https://www.suse.com/security/cve/CVE-2016-5008.html
   https://www.suse.com/security/cve/CVE-2017-5715.html
   https://www.suse.com/security/cve/CVE-2018-1064.html
   https://www.suse.com/security/cve/CVE-2018-3639.html
   https://www.suse.com/security/cve/CVE-2018-5748.html
   https://bugzilla.suse.com/1076500
   https://bugzilla.suse.com/1079869
   https://bugzilla.suse.com/1083625
   https://bugzilla.suse.com/1092885
   https://bugzilla.suse.com/854343
   https://bugzilla.suse.com/897352
   https://bugzilla.suse.com/954872
   https://bugzilla.suse.com/956298
   https://bugzilla.suse.com/964465
   https://bugzilla.suse.com/968483
   https://bugzilla.suse.com/980558
   https://bugzilla.suse.com/987527

SUSE: 2018:2141-1 important: libvirt

July 31, 2018
An update that solves 5 vulnerabilities and has 7 fixes is now available

Summary

This update for libvirt fixes the following issues: Security issues fixed: - CVE-2018-3639: Add support for 'ssbd' and 'virt-ssbd' CPUID feature bits to address V4 Speculative Store Bypass aka "Memory Disambiguation" (bsc#1092885). - CVE-2018-1064: Fix denial of service problem during reading from guest agent (bsc#1083625). - CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method (bsc#1076500). - CVE-2016-5008: Fix that an empty VNC password disables authentication (bsc#987527). - CVE-2017-5715: Fix speculative side channel attacks aka "SpectreAttack" (var2) (bsc#1079869). Bug fixes: - bsc#980558: Fix NUMA node memory allocation. - bsc#968483: Restart daemons in %posttrans after connection drivers. - bsc#897352: Systemd fails to ignore LSB services. - bsc#956298: virsh domxml-to-native causes segfault of libvirtd. - bsc#964465: libvirtd.service causes systemd warning about xencommons service. - bsc#954872: Script block-dmmd not working as expected. - bsc#854343: libvirt installation run inappropriate systemd restart. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2018-1455=1 Package List: - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): libvirt-1.2.5-27.13.1 libvirt-client-1.2.5-27.13.1 libvirt-client-debuginfo-1.2.5-27.13.1 libvirt-daemon-1.2.5-27.13.1 libvirt-daemon-config-network-1.2.5-27.13.1 libvirt-daemon-config-nwfilter-1.2.5-27.13.1 libvirt-daemon-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-interface-1.2.5-27.13.1 libvirt-daemon-driver-interface-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-lxc-1.2.5-27.13.1 libvirt-daemon-driver-lxc-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-network-1.2.5-27.13.1 libvirt-daemon-driver-network-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-nodedev-1.2.5-27.13.1 libvirt-daemon-driver-nodedev-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-nwfilter-1.2.5-27.13.1 libvirt-daemon-driver-nwfilter-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-qemu-1.2.5-27.13.1 libvirt-daemon-driver-qemu-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-secret-1.2.5-27.13.1 libvirt-daemon-driver-secret-debuginfo-1.2.5-27.13.1 libvirt-daemon-driver-storage-1.2.5-27.13.1 libvirt-daemon-driver-storage-debuginfo-1.2.5-27.13.1 libvirt-daemon-lxc-1.2.5-27.13.1 libvirt-daemon-qemu-1.2.5-27.13.1 libvirt-debugsource-1.2.5-27.13.1 libvirt-doc-1.2.5-27.13.1 libvirt-lock-sanlock-1.2.5-27.13.1 libvirt-lock-sanlock-debuginfo-1.2.5-27.13.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): libvirt-daemon-driver-libxl-1.2.5-27.13.1 libvirt-daemon-driver-libxl-debuginfo-1.2.5-27.13.1 libvirt-daemon-xen-1.2.5-27.13.1

References

#1076500 #1079869 #1083625 #1092885 #854343

#897352 #954872 #956298 #964465 #968483 #980558

#987527

Cross- CVE-2016-5008 CVE-2017-5715 CVE-2018-1064

CVE-2018-3639 CVE-2018-5748

Affected Products:

SUSE Linux Enterprise Server 12-LTSS

https://www.suse.com/security/cve/CVE-2016-5008.html

https://www.suse.com/security/cve/CVE-2017-5715.html

https://www.suse.com/security/cve/CVE-2018-1064.html

https://www.suse.com/security/cve/CVE-2018-3639.html

https://www.suse.com/security/cve/CVE-2018-5748.html

https://bugzilla.suse.com/1076500

https://bugzilla.suse.com/1079869

https://bugzilla.suse.com/1083625

https://bugzilla.suse.com/1092885

https://bugzilla.suse.com/854343

https://bugzilla.suse.com/897352

https://bugzilla.suse.com/954872

https://bugzilla.suse.com/956298

https://bugzilla.suse.com/964465

https://bugzilla.suse.com/968483

https://bugzilla.suse.com/980558

https://bugzilla.suse.com/987527

Severity
Announcement ID: SUSE-SU-2018:2141-1
Rating: important

Related News