Ubuntu 3985-2: libvirt update

    Date16 May 2019
    CategoryUbuntu
    35
    Posted ByLinuxSecurity Advisories
    Several security issues were addressed in libvirt.
    ==========================================================================
    Ubuntu Security Notice USN-3985-2
    May 16, 2019
    
    libvirt update
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 14.04 ESM
    
    Summary:
    
    Several security issues were addressed in libvirt.
    
    Software Description:
    - libvirt: Libvirt virtualization toolkit
    
    Details:
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan
    Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa
    Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,
    Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss
    discovered that memory previously stored in microarchitectural fill buffers
    of an Intel CPU core may be exposed to a malicious process that is
    executing on the same CPU core. A local attacker could use this to expose
    sensitive information. (CVE-2018-12130)
    
    Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan
    van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh
    Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory
    previously stored in microarchitectural load ports of an Intel CPU core may
    be exposed to a malicious process that is executing on the same CPU core. A
    local attacker could use this to expose sensitive information.
    (CVE-2018-12127)
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel
    Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel
    Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory
    previously stored in microarchitectural store buffers of an Intel CPU core
    may be exposed to a malicious process that is executing on the same CPU
    core. A local attacker could use this to expose sensitive information.
    (CVE-2018-12126)
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,
    Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa
    Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and
    Cristiano Giuffrida discovered that uncacheable memory previously stored in
    microarchitectural buffers of an Intel CPU core may be exposed to a
    malicious process that is executing on the same CPU core. A local attacker
    could use this to expose sensitive information. (CVE-2019-11091)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 14.04 ESM:
      libvirt-bin                     1.2.2-0ubuntu13.1.28
      libvirt0                        1.2.2-0ubuntu13.1.28
    
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    
    References:
      https://usn.ubuntu.com/usn/usn-3985-2
      https://usn.ubuntu.com/usn/usn-3985-1
      CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091,
      https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.