File _patchinfo of Package patchinfo.6841

<patchinfo incident="6841">
  <issue id="1080042" tracker="bnc">VUL-1: CVE-2018-6764: libvirt: guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init</issue>
  <issue id="1079869" tracker="bnc">VUL-0: libvirt: fixes for speculative side channel attacks  aka "SpectreAttack" (var2)</issue>
  <issue id="1083625" tracker="bnc">VUL-0: EMBARGOED: CVE-2018-1064: libvirt: Denial of service reading from guest agent</issue>
  <issue id="1078808" tracker="bnc">Error starting domain: internal error: No usable sysfs TPM cancel file could  be found</issue>
  <issue id="1082041" tracker="bnc">L3: sles11sp4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot</issue>
  <issue id="2017-5715" tracker="cve" />
  <issue id="2018-1064" tracker="cve" />
  <issue id="2018-6764" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>jfehlig</packager>
  <description>This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka &quot;SpectreAttack&quot; (var2) (bsc#1079869).
- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).


Non-security issues fixed:

- Error starting domain: internal error: No usable sysfs TPM cancel file could  be found (bsc#1078808).
- SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot (bsc#1082041).
</description>
  <summary>Security update for libvirt</summary>
</patchinfo>
openSUSE Build Service is sponsored by