{"id":"USN-3680-1","summary":"libvirt vulnerability and update","details":"Ken Johnson and Jann Horn independently discovered that microprocessors\nutilizing speculative execution of a memory read may allow unauthorized\nmemory reads via sidechannel attacks. An attacker in the guest could use\nthis to expose sensitive guest information, including kernel memory. This\nupdate allows libvirt to expose new CPU features added by microcode updates\nto guests. (CVE-2018-3639)\n\nDaniel P. Berrange discovered that libvirt incorrectly handled the QEMU\nguest agent. An attacker could possibly use this issue to consume\nresources, leading to a denial of service. (CVE-2018-1064)\n","modified":"2026-02-10T04:41:21Z","published":"2018-06-12T11:33:12Z","related":["UBUNTU-CVE-2018-1064","UBUNTU-CVE-2018-3639"],"upstream":["CVE-2018-1064","CVE-2018-3639","UBUNTU-CVE-2018-1064","UBUNTU-CVE-2018-3639"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3680-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1064"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3639"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.2.2-0ubuntu13.1.27?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.2-0ubuntu13.1.27"}]}],"versions":["1.1.1-0ubuntu8","1.1.1-0ubuntu9","1.1.4-0ubuntu2","1.1.4-0ubuntu3","1.1.4-0ubuntu4","1.1.4-0ubuntu5","1.2.0-0ubuntu1","1.2.0-0ubuntu2","1.2.0-0ubuntu3","1.2.1-0ubuntu1","1.2.1-0ubuntu2","1.2.1-0ubuntu3","1.2.1-0ubuntu4","1.2.1-0ubuntu5","1.2.1-0ubuntu7","1.2.1-0ubuntu8","1.2.1-0ubuntu9","1.2.1-0ubuntu10","1.2.2-0ubuntu1","1.2.2-0ubuntu2","1.2.2-0ubuntu3","1.2.2-0ubuntu4","1.2.2-0ubuntu5","1.2.2-0ubuntu6","1.2.2-0ubuntu7","1.2.2-0ubuntu8","1.2.2-0ubuntu9","1.2.2-0ubuntu10","1.2.2-0ubuntu11","1.2.2-0ubuntu12","1.2.2-0ubuntu13","1.2.2-0ubuntu13.1","1.2.2-0ubuntu13.1.1","1.2.2-0ubuntu13.1.2","1.2.2-0ubuntu13.1.4","1.2.2-0ubuntu13.1.5","1.2.2-0ubuntu13.1.6","1.2.2-0ubuntu13.1.7","1.2.2-0ubuntu13.1.8","1.2.2-0ubuntu13.1.9","1.2.2-0ubuntu13.1.10","1.2.2-0ubuntu13.1.12","1.2.2-0ubuntu13.1.14","1.2.2-0ubuntu13.1.16","1.2.2-0ubuntu13.1.17","1.2.2-0ubuntu13.1.20","1.2.2-0ubuntu13.1.21","1.2.2-0ubuntu13.1.22","1.2.2-0ubuntu13.1.23","1.2.2-0ubuntu13.1.25","1.2.2-0ubuntu13.1.26"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libvirt-bin","binary_version":"1.2.2-0ubuntu13.1.27"},{"binary_name":"libvirt-dev","binary_version":"1.2.2-0ubuntu13.1.27"},{"binary_name":"libvirt0","binary_version":"1.2.2-0ubuntu13.1.27"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3680-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-1064"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3639"}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"libvirt","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.3.1-1ubuntu10.24?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.1-1ubuntu10.24"}]}],"versions":["1.2.16-2ubuntu11","1.2.16-2ubuntu12","1.2.16-2ubuntu13","1.2.16-2ubuntu14","1.2.21-2ubuntu1","1.2.21-2ubuntu3","1.2.21-2ubuntu4","1.2.21-2ubuntu5","1.2.21-2ubuntu7","1.2.21-2ubuntu8","1.2.21-2ubuntu9","1.2.21-2ubuntu10","1.3.1-1ubuntu1","1.3.1-1ubuntu2","1.3.1-1ubuntu3","1.3.1-1ubuntu4","1.3.1-1ubuntu6","1.3.1-1ubuntu9","1.3.1-1ubuntu10","1.3.1-1ubuntu10.1","1.3.1-1ubuntu10.2","1.3.1-1ubuntu10.3","1.3.1-1ubuntu10.5","1.3.1-1ubuntu10.6","1.3.1-1ubuntu10.7","1.3.1-1ubuntu10.8","1.3.1-1ubuntu10.10","1.3.1-1ubuntu10.11","1.3.1-1ubuntu10.12","1.3.1-1ubuntu10.13","1.3.1-1ubuntu10.14","1.3.1-1ubuntu10.15","1.3.1-1ubuntu10.17","1.3.1-1ubuntu10.18","1.3.1-1ubuntu10.19","1.3.1-1ubuntu10.21","1.3.1-1ubuntu10.22","1.3.1-1ubuntu10.23"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libvirt-bin","binary_version":"1.3.1-1ubuntu10.24"},{"binary_name":"libvirt-dev","binary_version":"1.3.1-1ubuntu10.24"},{"binary_name":"libvirt0","binary_version":"1.3.1-1ubuntu10.24"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3680-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-1064"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3639"}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"libvirt","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libvirt@4.0.0-1ubuntu8.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.0-1ubuntu8.2"}]}],"versions":["3.6.0-1ubuntu5","3.6.0-1ubuntu6","4.0.0-1ubuntu1","4.0.0-1ubuntu2","4.0.0-1ubuntu3","4.0.0-1ubuntu4","4.0.0-1ubuntu5","4.0.0-1ubuntu6","4.0.0-1ubuntu7","4.0.0-1ubuntu8","4.0.0-1ubuntu8.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libnss-libvirt","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-bin","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-clients","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon-driver-storage-gluster","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon-driver-storage-rbd","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon-driver-storage-sheepdog","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon-driver-storage-zfs","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-daemon-system","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-dev","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-sanlock","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt-wireshark","binary_version":"4.0.0-1ubuntu8.2"},{"binary_name":"libvirt0","binary_version":"4.0.0-1ubuntu8.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3680-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-1064"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3639"}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}