Package "libvirt0-dbg"

Name: libvirt0-dbg


library for interfacing with different virtualization systems

Latest version: 1.2.2-0ubuntu13.1.28
Release: trusty (14.04)
Level: updates
Repository: main
Head package: libvirt
Homepage: http://libvirt.org


Download "libvirt0-dbg"

Other versions of "libvirt0-dbg" in Trusty

Repository Area Version
base main 1.2.2-0ubuntu13
security main 1.2.2-0ubuntu13.1.28


Version: 1.2.2-0ubuntu13.1.28 2019-05-17 00:07:08 UTC

  libvirt (1.2.2-0ubuntu13.1.28) trusty-security; urgency=medium

  * SECURITY UPDATE: Add support for md-clear functionality
    - debian/patches/md-clear.patch: Define md-clear CPUID bit in
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091

 -- Steve Beattie <email address hidden> Thu, 16 May 2019 12:56:28 -0700

Source diff to previous version
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2019-11091 MDSUM Microarchitectural Data Sampling Uncacheable Memory

Version: 1.2.2-0ubuntu13.1.27 2018-06-13 13:07:33 UTC

  libvirt (1.2.2-0ubuntu13.1.27) trusty-security; urgency=medium

    - debian/patches/CVE-2018-1064.patch: add size limit to
    - CVE-2018-1064
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-1.patch: define the 'ssbd' CPUID feature
      bit in src/cpu/cpu_map.xml.
    - debian/patches/CVE-2018-3639-2.patch: define the 'virt-ssbd' CPUID
      feature bit in src/cpu/cpu_map.xml.
    - CVE-2018-3639

 -- Marc Deslauriers <email address hidden> Wed, 23 May 2018 14:23:45 -0400

Source diff to previous version
CVE-2018-1064 libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor
CVE-2018-3639 Speculative Store Bypass

Version: 1.2.2-0ubuntu13.1.26 2018-02-20 23:07:01 UTC

  libvirt (1.2.2-0ubuntu13.1.26) trusty-security; urgency=medium

  * SECURITY UPDATE: resource exhaustion resulting in DoS
    - debian/patches/CVE-2018-5748.patch: avoid DoS reading from
      QEMU monitor in src/qemu/qemu_monitor.c.
    - CVE-2018-5748
  * SECURITY UPDATE: Bypass authentication
    - debian/patches/CVE-2016-5008.patch: let empty default VNC
      password work as documented in src/qemu/qemu_hotplug.c.
    - CVE-2016-5008

 -- <email address hidden> (Leonidas S. Barbosa) Fri, 16 Feb 2018 07:51:15 -0500

Source diff to previous version
CVE-2018-5748 qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
CVE-2016-5008 libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers

Version: 1.2.2-0ubuntu13.1.25 2018-02-07 20:06:35 UTC

  libvirt (1.2.2-0ubuntu13.1.25) trusty-security; urgency=medium

  * SECURITY UPDATE: Add support for Spectre mitigations
    - debian/patches/CVE-2017-5715-ibrs*.patch: add CPU features for
      indirect branch prediction protection and add new *-IBRS CPU models.
    - debian/control: add Breaks to get updated qemu with new CPU models.
    - CVE-2017-5715

 -- Marc Deslauriers <email address hidden> Thu, 01 Feb 2018 15:00:47 -0500

Source diff to previous version
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at

Version: 1.2.2-0ubuntu13.1.23 2017-10-05 18:06:49 UTC

  libvirt (1.2.2-0ubuntu13.1.23) trusty; urgency=medium

  * d/libvirt-bin.init, d/libvirt-bin.upstart: fix waiting for the libvirt
    socket (LP: #1571209)
    - avoid timing out on slow systems (only stop when service is stopped)
    - fix whitespace damage formerly added to d/libvirt-bin.init
    - no more long sleep without announcing to log
    - check socket and service status more often for lower latency on changes
    - fix check if unix_sock_dir path is set in /etc/libvirt/libvirtd.conf
    - fix the upstart service name that is checked

 -- Christian Ehrhardt <email address hidden> Thu, 07 Sep 2017 14:22:45 +0200

1571209 Sockfile check retries too short for a busy system boot

About   -   Send Feedback to @ubuntu_updates