First published: Tue Jun 12 2018(Updated: )
Ken Johnson and Jann Horn independently discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via sidechannel attacks. An attacker in the guest could use this to expose sensitive guest information, including kernel memory. This update allows libvirt to expose new CPU features added by microcode updates to guests. (CVE-2018-3639) Daniel P. Berrange discovered that libvirt incorrectly handled the QEMU guest agent. An attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2018-1064)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libvirt-bin | <4.0.0-1ubuntu8.2 | 4.0.0-1ubuntu8.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libvirt0 | <4.0.0-1ubuntu8.2 | 4.0.0-1ubuntu8.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libvirt-bin | <3.6.0-1ubuntu6.8 | 3.6.0-1ubuntu6.8 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/libvirt0 | <3.6.0-1ubuntu6.8 | 3.6.0-1ubuntu6.8 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/libvirt-bin | <1.3.1-1ubuntu10.24 | 1.3.1-1ubuntu10.24 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libvirt0 | <1.3.1-1ubuntu10.24 | 1.3.1-1ubuntu10.24 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libvirt-bin | <1.2.2-0ubuntu13.1.27 | 1.2.2-0ubuntu13.1.27 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/libvirt0 | <1.2.2-0ubuntu13.1.27 | 1.2.2-0ubuntu13.1.27 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this update is CVE-2018-1064.
The severity of the vulnerability is not specified.
The vulnerability allows unauthorized memory reads via sidechannel attacks on microprocessors utilizing speculative execution of a memory read.
The affected software is libvirt-bin and libvirt0 on Ubuntu 14.04, 16.04, 17.10, and 18.04.
To fix the vulnerability, update the libvirt-bin and libvirt0 packages to version 4.0.0-1ubuntu8.2, 3.6.0-1ubuntu6.8, or 1.3.1-1ubuntu10.24 depending on the Ubuntu version.