Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:1667 - Security Advisory
Issued:
2018-05-21
Updated:
2018-05-21

RHSA-2018:1667 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: libvirt security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

Security Fix(es):

  • An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)

Note: This is the libvirt side of the CVE-2018-3639 mitigation.

Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, libvirtd will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64
  • Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64

Fixes

  • BZ - 1566890 - CVE-2018-3639 hw: cpu: speculative store bypass

CVEs

  • CVE-2018-3639

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/ssbd
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.7

SRPM
libvirt-0.10.2-54.el6_7.8.src.rpm SHA-256: b4086434af20a1435573e01fa9241605f23f626ec69f6621f332a7d39081ff8c
x86_64
libvirt-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: e5a4ebade529137eaccf509fdf505a3f09d02319fa0b8ebc26ef41a0e307f6f5
libvirt-client-0.10.2-54.el6_7.8.i686.rpm SHA-256: ef4fd1d137fd19288eb41fea458b1a2c71886311cac66a137a51c69ee1f2ae9b
libvirt-client-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 89d8d7bcf964ff9535c455d0e8c7ecfa668fc73fcbf0bb33406de80da89f67fc
libvirt-debuginfo-0.10.2-54.el6_7.8.i686.rpm SHA-256: 3cc28abe72893aa909b15847088e529a1524ddb5add1b716c1e431435009e2de
libvirt-debuginfo-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 18847c40bb8c60babe1e36ac7071e094f3de1448826d9cc7e282f26ca42ab74a
libvirt-debuginfo-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 18847c40bb8c60babe1e36ac7071e094f3de1448826d9cc7e282f26ca42ab74a
libvirt-devel-0.10.2-54.el6_7.8.i686.rpm SHA-256: 7eb77166f27deafa04c6f2c39b4b8b52512ce8bfba35a0ac15956038db5befc0
libvirt-devel-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 0c64906b89c67a9503bf933a9d4e3603a0418f9166cf018a08bdb5fd952c7996
libvirt-lock-sanlock-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 89e7973cff094780ddbb6284ab675e807113da8d9d32dc6f1e4ea358645e6ea4
libvirt-python-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 6daa608ba194e2b8037f686ad80af0be79e5db73c0993b6af84e070f9f847ce4
i386
libvirt-0.10.2-54.el6_7.8.i686.rpm SHA-256: 0223a383704bcd0000d83ea8b4a2122ce38e395bbc247706c2b1802204c5ea7f
libvirt-client-0.10.2-54.el6_7.8.i686.rpm SHA-256: ef4fd1d137fd19288eb41fea458b1a2c71886311cac66a137a51c69ee1f2ae9b
libvirt-debuginfo-0.10.2-54.el6_7.8.i686.rpm SHA-256: 3cc28abe72893aa909b15847088e529a1524ddb5add1b716c1e431435009e2de
libvirt-devel-0.10.2-54.el6_7.8.i686.rpm SHA-256: 7eb77166f27deafa04c6f2c39b4b8b52512ce8bfba35a0ac15956038db5befc0
libvirt-python-0.10.2-54.el6_7.8.i686.rpm SHA-256: 7880438f611218123366bb9a5c694a48411c5ba322363fef782808fdc8cf1b0c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7

SRPM
libvirt-0.10.2-54.el6_7.8.src.rpm SHA-256: b4086434af20a1435573e01fa9241605f23f626ec69f6621f332a7d39081ff8c
s390x
libvirt-0.10.2-54.el6_7.8.s390x.rpm SHA-256: 42e027822bac794479189d986d3e0d80a5e0e38788b33b76d1ea97dc9a710792
libvirt-client-0.10.2-54.el6_7.8.s390.rpm SHA-256: 97ebeaf31a83797c6f40433ee5fe9862a4df9046d87607fd7b7aaacbd57de82c
libvirt-client-0.10.2-54.el6_7.8.s390x.rpm SHA-256: 54c2728384959c116803035b15ffd36a9b8d67597ff41dc6e0e17a316d81c1af
libvirt-debuginfo-0.10.2-54.el6_7.8.s390.rpm SHA-256: c0ce04ab710c07a287e4f92c748e909d22fce3d59669d1ac3b7df64edd74a447
libvirt-debuginfo-0.10.2-54.el6_7.8.s390x.rpm SHA-256: 4828e5fa922e6e4ad6ad0f707454be6d16aecb8817dacae65c3462ebf6f7657e
libvirt-devel-0.10.2-54.el6_7.8.s390.rpm SHA-256: d040907a554f80310855958c01ac413889527595b01a2a77460163dffa0259de
libvirt-devel-0.10.2-54.el6_7.8.s390x.rpm SHA-256: 7ba0ce49f2c87fd10178e656c047a345eae0334a5fd4407ce57134a529f65867
libvirt-python-0.10.2-54.el6_7.8.s390x.rpm SHA-256: 6d387ebf37ed9aca4662cae0de2ac15c8e6cfac4f875fef8fa6cd64f99af4e92

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7

SRPM
libvirt-0.10.2-54.el6_7.8.src.rpm SHA-256: b4086434af20a1435573e01fa9241605f23f626ec69f6621f332a7d39081ff8c
ppc64
libvirt-0.10.2-54.el6_7.8.ppc64.rpm SHA-256: 094cf70ea4aecf25b40c9165fc070832fec6886a50cf00448ee06b9816b50e52
libvirt-client-0.10.2-54.el6_7.8.ppc.rpm SHA-256: 9759915afbaeeb69fdf71039beb5784e125b490b5e72df67bfc21915cc405b04
libvirt-client-0.10.2-54.el6_7.8.ppc64.rpm SHA-256: cb60dbc761d475bb923567257ff565554c43756d9f665784fb12f811de48f082
libvirt-debuginfo-0.10.2-54.el6_7.8.ppc.rpm SHA-256: de0100e798a72b1a24dd9ad440c42bf1397fc4c0d676e8f18fd7a60780bb3a8a
libvirt-debuginfo-0.10.2-54.el6_7.8.ppc64.rpm SHA-256: dc4be40a48a2f9a0875da7f0ea9cdb251fc853925c7591c5065fb2eec453676e
libvirt-devel-0.10.2-54.el6_7.8.ppc.rpm SHA-256: 6135e4a44fbed27393a78fa25e4a9638c5ada46337aabb0707098707afeeccdb
libvirt-devel-0.10.2-54.el6_7.8.ppc64.rpm SHA-256: c0bf7af971d520a4015bf5d1f5640b8d67254bc9cad518dab983d9f9cf84a61b
libvirt-python-0.10.2-54.el6_7.8.ppc64.rpm SHA-256: 33818a367219685558161c8614eb6b4c8192549da1be36bdb2e93d455df996e3

Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7

SRPM
libvirt-0.10.2-54.el6_7.8.src.rpm SHA-256: b4086434af20a1435573e01fa9241605f23f626ec69f6621f332a7d39081ff8c
x86_64
libvirt-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: e5a4ebade529137eaccf509fdf505a3f09d02319fa0b8ebc26ef41a0e307f6f5
libvirt-client-0.10.2-54.el6_7.8.i686.rpm SHA-256: ef4fd1d137fd19288eb41fea458b1a2c71886311cac66a137a51c69ee1f2ae9b
libvirt-client-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 89d8d7bcf964ff9535c455d0e8c7ecfa668fc73fcbf0bb33406de80da89f67fc
libvirt-debuginfo-0.10.2-54.el6_7.8.i686.rpm SHA-256: 3cc28abe72893aa909b15847088e529a1524ddb5add1b716c1e431435009e2de
libvirt-debuginfo-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 18847c40bb8c60babe1e36ac7071e094f3de1448826d9cc7e282f26ca42ab74a
libvirt-devel-0.10.2-54.el6_7.8.i686.rpm SHA-256: 7eb77166f27deafa04c6f2c39b4b8b52512ce8bfba35a0ac15956038db5befc0
libvirt-devel-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 0c64906b89c67a9503bf933a9d4e3603a0418f9166cf018a08bdb5fd952c7996
libvirt-python-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 6daa608ba194e2b8037f686ad80af0be79e5db73c0993b6af84e070f9f847ce4

Red Hat Enterprise Linux EUS Compute Node 6.7

SRPM
libvirt-0.10.2-54.el6_7.8.src.rpm SHA-256: b4086434af20a1435573e01fa9241605f23f626ec69f6621f332a7d39081ff8c
x86_64
libvirt-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: e5a4ebade529137eaccf509fdf505a3f09d02319fa0b8ebc26ef41a0e307f6f5
libvirt-client-0.10.2-54.el6_7.8.i686.rpm SHA-256: ef4fd1d137fd19288eb41fea458b1a2c71886311cac66a137a51c69ee1f2ae9b
libvirt-client-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 89d8d7bcf964ff9535c455d0e8c7ecfa668fc73fcbf0bb33406de80da89f67fc
libvirt-debuginfo-0.10.2-54.el6_7.8.i686.rpm SHA-256: 3cc28abe72893aa909b15847088e529a1524ddb5add1b716c1e431435009e2de
libvirt-debuginfo-0.10.2-54.el6_7.8.i686.rpm SHA-256: 3cc28abe72893aa909b15847088e529a1524ddb5add1b716c1e431435009e2de
libvirt-debuginfo-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 18847c40bb8c60babe1e36ac7071e094f3de1448826d9cc7e282f26ca42ab74a
libvirt-debuginfo-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 18847c40bb8c60babe1e36ac7071e094f3de1448826d9cc7e282f26ca42ab74a
libvirt-devel-0.10.2-54.el6_7.8.i686.rpm SHA-256: 7eb77166f27deafa04c6f2c39b4b8b52512ce8bfba35a0ac15956038db5befc0
libvirt-devel-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 0c64906b89c67a9503bf933a9d4e3603a0418f9166cf018a08bdb5fd952c7996
libvirt-lock-sanlock-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 89e7973cff094780ddbb6284ab675e807113da8d9d32dc6f1e4ea358645e6ea4
libvirt-python-0.10.2-54.el6_7.8.x86_64.rpm SHA-256: 6daa608ba194e2b8037f686ad80af0be79e5db73c0993b6af84e070f9f847ce4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility