openSUSE Security Update : libvirt (openSUSE-2018-358) (Spectre)

Medium Nessus Plugin ID 109020

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libvirt and virt-manager fixes the following issues :

Security issues fixed :

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).

- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).

- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).

Non-security issues fixed in libvirt :

- bsc#1070615: Fixed TPM device passthrough failure on kernels >= 4.0.

- bsc#1082041: SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot.

- bsc#1082161: Unable to change RTC basis or adjustment for Xen HVM guests using libvirt.

Non-security issues fixed in virt-manager :

- bsc#1086038: VM guests cannot be properly installed with virt-install

- bsc#1067018: KVM Guest creation failed - Property .cmt not found

- bsc#1054986: Fix openSUSE 15.0 detection. It has no content file or .treeinfo file

- bsc#1085757: Fallback to latest version of openSUSE when opensuse-unknown is detected for the ISO

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Solution

Update the affected libvirt packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1054986

https://bugzilla.opensuse.org/show_bug.cgi?id=1067018

https://bugzilla.opensuse.org/show_bug.cgi?id=1070615

https://bugzilla.opensuse.org/show_bug.cgi?id=1079869

https://bugzilla.opensuse.org/show_bug.cgi?id=1080042

https://bugzilla.opensuse.org/show_bug.cgi?id=1082041

https://bugzilla.opensuse.org/show_bug.cgi?id=1082161

https://bugzilla.opensuse.org/show_bug.cgi?id=1083625

https://bugzilla.opensuse.org/show_bug.cgi?id=1085757

https://bugzilla.opensuse.org/show_bug.cgi?id=1086038

Plugin Details

Severity: Medium

ID: 109020

File Name: openSUSE-2018-358.nasl

Version: 1.7

Type: local

Agent: unix

Published: 2018/04/13

Updated: 2019/07/09

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libvirt, p-cpe:/a:novell:opensuse:libvirt-admin, p-cpe:/a:novell:opensuse:libvirt-admin-debuginfo, p-cpe:/a:novell:opensuse:libvirt-client, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo, p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit, p-cpe:/a:novell:opensuse:libvirt-daemon, p-cpe:/a:novell:opensuse:libvirt-daemon-config-network, p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter, p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox, p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo, p-cpe:/a:novell:opensuse:libvirt-daemon-hooks, p-cpe:/a:novell:opensuse:libvirt-daemon-lxc, p-cpe:/a:novell:opensuse:libvirt-daemon-qemu, p-cpe:/a:novell:opensuse:libvirt-daemon-uml, p-cpe:/a:novell:opensuse:libvirt-daemon-vbox, p-cpe:/a:novell:opensuse:libvirt-daemon-xen, p-cpe:/a:novell:opensuse:libvirt-debugsource, p-cpe:/a:novell:opensuse:libvirt-devel, p-cpe:/a:novell:opensuse:libvirt-devel-32bit, p-cpe:/a:novell:opensuse:libvirt-libs, p-cpe:/a:novell:opensuse:libvirt-libs-debuginfo, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock, p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo, p-cpe:/a:novell:opensuse:libvirt-nss, p-cpe:/a:novell:opensuse:libvirt-nss-debuginfo, p-cpe:/a:novell:opensuse:virt-install, p-cpe:/a:novell:opensuse:virt-manager, p-cpe:/a:novell:opensuse:virt-manager-common, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/04/12

Vulnerability Publication Date: 2018/01/04

Reference Information

CVE: CVE-2017-5715, CVE-2018-1064, CVE-2018-6764

IAVA: 2018-A-0020