[USN-3909-1] libvirt vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”SxkYmuLSWjSsIge13pGqNDIfO7nd4uipz”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–SxkYmuLSWjSsIge13pGqNDIfO7nd4uipz

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3909-1] libvirt vulnerability

–YicbONOzFy8yj4Y0XPhr9jzRko2EVMYg8

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3909-1
March 14, 2019

libvirt vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

libvirt could be made to crash under certain conditions.

Software Description:
– libvirt: Libvirt virtualization toolkit

Details:

It was discovered that libvirt incorrectly handled waiting for certain
agent events. An attacker inside a guest could possibly use this issue to=

cause libvirtd to stop responding, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libvirt-clients 4.6.0-2ubuntu3.4
libvirt-daemon 4.6.0-2ubuntu3.4
libvirt0 4.6.0-2ubuntu3.4

Ubuntu 18.04 LTS:
libvirt-clients 4.0.0-1ubuntu8.8
libvirt-daemon 4.0.0-1ubuntu8.8
libvirt0 4.0.0-1ubuntu8.8

Ubuntu 16.04 LTS:
libvirt-bin 1.3.1-1ubuntu10.25
libvirt0 1.3.1-1ubuntu10.25

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3909-1
CVE-2019-3840

Package Information:
https://launchpad.net/ubuntu/+source/libvirt/4.6.0-2ubuntu3.4
https://launchpad.net/ubuntu/+source/libvirt/4.0.0-1ubuntu8.8
https://launchpad.net/ubuntu/+source/libvirt/1.3.1-1ubuntu10.25

–YicbONOzFy8yj4Y0XPhr9jzRko2EVMYg8–

–SxkYmuLSWjSsIge13pGqNDIfO7nd4uipz

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlyKn1QACgkQZWnYVadE
vpOacQ/9HDU1zy6xKB6XYU+iwxaBDytqtU6EDiW5x2UZAHdqfsCX5tiJN/P0vZFk
eZ4Fkvlh7VdPUuAORe8mhO15qZUrrsHTwbaVn7yQVcJZF7wuPlRHxREiEnGDbn2d
SoOOS5vQok/4VHaDQ+aU4vXhbEpRTtOisOfHcfsR3mxltuNAva8gdOTjbOkarGuP
VwG69OK1LwkZj+tfmrd/35aJAk5V55vogySSibDRAGKVn2JlsW5r1iKwGHgw/Qng
h5pv2SVuFxZfzd+IZrAzNeE/KfhNAffynZcjGAfdQ2t7/uMvW5OSQPn2Q897N+TI
vaPUTNzKmbo2zGl0rT7aLaaF6DWUWzd9C9z0j3O5RrsGvsT07nPgxLqjbgbS8Lx9
q4tnG3yP0E08bpc/pmLcgGotPKBcb9Vmyh0yXPm7kdf1LH3BlhgBAUc1AmBA4c5f
LnsiRQFrXOkxu7UyoLI4wE1WuZ3ZboUNfjRuyq/v+0hHQI8380uS5oAVQL/BWEvn
GJ44k7xRHiYRLB1G/VIjVxKt7OnEa6HqusQwNRMIZq7wFSb49YvlJOgDRIPH0Q0J
+KZqIskOCeT/uLIss+lWNid/0y41IuNKfcFenBrZA6fdpO5UM86YrujulbtnHGi4
sVzalKY1B1p5g7LY+0tbNOxYvLTx9qpdcnJM/GCTXPG3LiCBqzU=
=41J1
—–END PGP SIGNATURE—–

–SxkYmuLSWjSsIge13pGqNDIfO7nd4uipz–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK