USN-2093-1: libvirt vulnerabilities

Ubuntu Security Notice USN-2093-1


30th January, 2014


libvirt vulnerabilities


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 13.10

  • Ubuntu 12.10

  • Ubuntu 12.04 LTS


Summary


Several security issues were fixed in libvirt.


Software description



  • libvirt - Libvirt virtualization toolkit


Details


Martin Kletzander discovered that libvirt incorrectly handled reading

memory tunables from LXC guests. A local user could possibly use this flaw

to cause libvirtd to crash, resulting in a denial of service. This issue

only affected Ubuntu 13.10. (CVE-2013-6436)


Dario Faggioli discovered that libvirt incorrectly handled the libxl

driver. A local user could possibly use this flaw to cause libvirtd to

crash, resulting in a denial of service, or possibly execute arbitrary

code. This issue only affected Ubuntu 13.10. (CVE-2013-6457)


It was discovered that libvirt contained multiple race conditions in block

device handling. A remote read-only user could use this flaw to cause

libvirtd to crash, resulting in a denial of service. (CVE-2013-6458)


Eric Blake discovered that libvirt incorrectly handled certain ACLs. An

attacker could use this flaw to possibly obtain certain sensitive

information. This issue only affected Ubuntu 13.10. (CVE-2014-0028)


Jiri Denemark discovered that libvirt incorrectly handled keepalives. A

remote attacker could possibly use this flaw to cause libvirtd to crash,

resulting in a denial of service. (CVE-2014-1447)


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 13.10:

libvirt0 1.1.1-0ubuntu8.5

libvirt-bin 1.1.1-0ubuntu8.5

Ubuntu 12.10:

libvirt0 0.9.13-0ubuntu12.6

libvirt-bin 0.9.13-0ubuntu12.6

Ubuntu 12.04 LTS:

libvirt0 0.9.8-2ubuntu17.17

libvirt-bin 0.9.8-2ubuntu17.17


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


After a standard system update you need to reboot your computer to make

all the necessary changes.


References


CVE-2013-6436, CVE-2013-6457, CVE-2013-6458, CVE-2014-0028, CVE-2014-1447






via Ubuntu Security Notices http://bit.ly/1guT2Or