UbuntuUpdates.org

Package "libvirt0"

Name: libvirt0

Description:

library for interfacing with different virtualization systems

Latest version: 1.3.1-1ubuntu10.27
Release: xenial (16.04)
Level: updates
Repository: main
Head package: libvirt
Homepage: http://libvirt.org

Links

Save this URL for the latest version of "libvirt0": https://www.ubuntuupdates.org/libvirt0


Download "libvirt0"


Other versions of "libvirt0" in Xenial

Repository Area Version
base main 1.3.1-1ubuntu10
security main 1.3.1-1ubuntu10.27
proposed main 1.3.1-1ubuntu10.28

Changelog

Version: 1.3.1-1ubuntu10.27 2019-07-08 14:08:46 UTC

  libvirt (1.3.1-1ubuntu10.27) xenial-security; urgency=medium

  * SECURITY UPDATE: virDomainSaveImageGetXMLDesc does not check for
    read-only connection
    - debian/patches/CVE-2019-10161.patch: add check to
      src/libvirt-domain.c, src/qemu/qemu_driver.c,
      src/remote/remote_protocol.x.
    - CVE-2019-10161
  * SECURITY UPDATE: virConnectGetDomainCapabilities does not check for
    read-only connection
    - debian/patches/CVE-2019-10167.patch: add check to
      src/libvirt-domain.c.
    - CVE-2019-10167

 -- Marc Deslauriers <email address hidden> Tue, 02 Jul 2019 09:22:37 -0400

Source diff to previous version
CVE-2019-10161 arbitrary file read/exec via virDomainSaveImageGetXMLDesc API
CVE-2019-10167 arbitrary command execution via virConnectGetDomainCapabilities API

Version: 1.3.1-1ubuntu10.26 2019-05-15 20:06:31 UTC

  libvirt (1.3.1-1ubuntu10.26) xenial-security; urgency=medium

  * SECURITY UPDATE: Add support for md-clear functionality
    - debian/patches/md-clear.patch: Define md-clear CPUID bit in
      src/cpu/cpu_map.xml.
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091

 -- Marc Deslauriers <email address hidden> Tue, 14 May 2019 15:13:18 -0400

Source diff to previous version
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2019-11091 MDSUM Microarchitectural Data Sampling Uncacheable Memory

Version: 1.3.1-1ubuntu10.25 2019-03-14 20:06:58 UTC

  libvirt (1.3.1-1ubuntu10.25) xenial-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference in qemuAgentGetInterfaces
    - debian/patches/CVE-2019-3840.patch: require a reply in
      src/qemu/qemu_agent.c.
    - CVE-2019-3840

 -- Marc Deslauriers <email address hidden> Wed, 13 Mar 2019 08:10:12 -0400

Source diff to previous version
CVE-2019-3840 NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function

Version: 1.3.1-1ubuntu10.24 2018-06-12 14:06:37 UTC

  libvirt (1.3.1-1ubuntu10.24) xenial-security; urgency=medium

  * SECURITY UPDATE: QEMU monitor DoS
    - debian/patches/CVE-2018-1064.patch: add size limit to
      src/qemu/qemu_agent.c.
    - CVE-2018-1064
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-1.patch: define the 'ssbd' CPUID feature
      bit in src/cpu/cpu_map.xml.
    - debian/patches/CVE-2018-3639-2.patch: define the 'virt-ssbd' CPUID
      feature bit in src/cpu/cpu_map.xml.
    - CVE-2018-3639

 -- Marc Deslauriers <email address hidden> Wed, 23 May 2018 13:29:29 -0400

Source diff to previous version
CVE-2018-1064 libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor
CVE-2018-3639 Speculative Store Bypass

Version: 1.3.1-1ubuntu10.23 2018-05-21 09:06:54 UTC

  libvirt (1.3.1-1ubuntu10.23) xenial; urgency=medium

  * Fix nwfilters that set CTRL_IP_LEARNING set to dhcp failing with "An error
    occurred, but the cause is unknown" due to a buffer being too small
    for pcap with TPACKET_V3 enabled (LP: #1758037)
    - debian/patches/ubuntu/lp-1758037-nwfilter-increase-pcap-buffer-size.patch

 -- Christian Ehrhardt <email address hidden> Fri, 11 May 2018 07:37:36 +0200

1758037 LTC Test- Ubuntu18.04: Starting the guest with network filter defined will fail with \



About   -   Send Feedback to @ubuntu_updates