[Trisquel-security] [USN-1954-1] libvirt vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Wed Sep 18 17:06:08 CEST 2013


==========================================================================
Ubuntu Security Notice USN-1954-1
September 18, 2013

libvirt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in libvirt.

Software Description:
- libvirt: Libvirt virtualization toolkit

Details:

It was discovered that libvirt used the pkcheck tool in an unsafe manner. A
local attacker could possibly use this flaw to bypass polkit
authentication. In Ubuntu, libvirt polkit authentication is not enabled by
default. (CVE-2013-4311)

It was discovered that libvirt incorrectly handled certain memory stats
requests. A remote attacker could use this issue to cause libvirt to
crash, resulting in a denial of service. This issue only affected Ubuntu
12.04 LTS, Ubuntu 12.10, and Ubuntu 13.04. (CVE-2013-4296)

It was discovered that libvirt incorrectly handled certain bitmap
operations. A remote attacker could use this issue to cause libvirt to
crash, resulting in a denial of service. This issue only affected Ubuntu
13.04. (CVE-2013-5651)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
  libvirt-bin                     1.0.2-0ubuntu11.13.04.4
  libvirt0                        1.0.2-0ubuntu11.13.04.4

Ubuntu 12.10:
  libvirt-bin                     0.9.13-0ubuntu12.5
  libvirt0                        0.9.13-0ubuntu12.5

Ubuntu 12.04 LTS:
  libvirt-bin                     0.9.8-2ubuntu17.13
  libvirt0                        0.9.8-2ubuntu17.13

Ubuntu 10.04 LTS:
  libvirt-bin                     0.7.5-5ubuntu27.24
  libvirt0                        0.7.5-5ubuntu27.24

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1954-1
  CVE-2013-4296, CVE-2013-4311, CVE-2013-5651

Package Information:
  https://launchpad.net/ubuntu/+source/libvirt/1.0.2-0ubuntu11.13.04.4
  https://launchpad.net/ubuntu/+source/libvirt/0.9.13-0ubuntu12.5
  https://launchpad.net/ubuntu/+source/libvirt/0.9.8-2ubuntu17.13
  https://launchpad.net/ubuntu/+source/libvirt/0.7.5-5ubuntu27.24


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20130918/75ef19d5/attachment-0001.pgp>
-------------- next part --------------
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


More information about the Trisquel-security mailing list