USN-2093-1: libvirt vulnerabilities

30 January 2014

libvirt vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in libvirt.

Software Description

  • libvirt - Libvirt virtualization toolkit

Details

Martin Kletzander discovered that libvirt incorrectly handled reading memory tunables from LXC guests. A local user could possibly use this flaw to cause libvirtd to crash, resulting in a denial of service. This issue only affected Ubuntu 13.10. (CVE-2013-6436)

Dario Faggioli discovered that libvirt incorrectly handled the libxl driver. A local user could possibly use this flaw to cause libvirtd to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 13.10. (CVE-2013-6457)

It was discovered that libvirt contained multiple race conditions in block device handling. A remote read-only user could use this flaw to cause libvirtd to crash, resulting in a denial of service. (CVE-2013-6458)

Eric Blake discovered that libvirt incorrectly handled certain ACLs. An attacker could use this flaw to possibly obtain certain sensitive information. This issue only affected Ubuntu 13.10. (CVE-2014-0028)

Jiri Denemark discovered that libvirt incorrectly handled keepalives. A remote attacker could possibly use this flaw to cause libvirtd to crash, resulting in a denial of service. (CVE-2014-1447)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10
libvirt-bin - 1.1.1-0ubuntu8.5
libvirt0 - 1.1.1-0ubuntu8.5
Ubuntu 12.10
libvirt-bin - 0.9.13-0ubuntu12.6
libvirt0 - 0.9.13-0ubuntu12.6
Ubuntu 12.04 LTS
libvirt-bin - 0.9.8-2ubuntu17.17
libvirt0 - 0.9.8-2ubuntu17.17

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References