Package "libvirt"

Name: libvirt


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • programs for the libvirt library
  • development files for the libvirt library
  • documentation for the libvirt library
  • library for interfacing with different virtualization systems

Latest version: 1.3.1-1ubuntu10.30
Release: xenial (16.04)
Level: updates
Repository: main


Other versions of "libvirt" in Xenial

Repository Area Version
base main 1.3.1-1ubuntu10
security main 1.3.1-1ubuntu10.27

Packages in group

Deleted packages are displayed in grey.


Version: 1.3.1-1ubuntu10.24 2018-06-12 14:06:37 UTC

  libvirt (1.3.1-1ubuntu10.24) xenial-security; urgency=medium

    - debian/patches/CVE-2018-1064.patch: add size limit to
    - CVE-2018-1064
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-1.patch: define the 'ssbd' CPUID feature
      bit in src/cpu/cpu_map.xml.
    - debian/patches/CVE-2018-3639-2.patch: define the 'virt-ssbd' CPUID
      feature bit in src/cpu/cpu_map.xml.
    - CVE-2018-3639

 -- Marc Deslauriers <email address hidden> Wed, 23 May 2018 13:29:29 -0400

Source diff to previous version
CVE-2018-1064 libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor
CVE-2018-3639 Speculative Store Bypass

Version: 1.3.1-1ubuntu10.23 2018-05-21 09:06:54 UTC

  libvirt (1.3.1-1ubuntu10.23) xenial; urgency=medium

  * Fix nwfilters that set CTRL_IP_LEARNING set to dhcp failing with "An error
    occurred, but the cause is unknown" due to a buffer being too small
    for pcap with TPACKET_V3 enabled (LP: #1758037)
    - debian/patches/ubuntu/lp-1758037-nwfilter-increase-pcap-buffer-size.patch

 -- Christian Ehrhardt <email address hidden> Fri, 11 May 2018 07:37:36 +0200

Source diff to previous version
1758037 LTC Test- Ubuntu18.04: Starting the guest with network filter defined will fail with \

Version: 1.3.1-1ubuntu10.22 2018-05-03 18:07:10 UTC

  libvirt (1.3.1-1ubuntu10.22) xenial; urgency=medium

  * Fix clean shut down of guests on system shutdown (LP: #1764668)
    - d/p/ubuntu/lp-1764668-do-not-report-unknown-guests.patch
    - d/p/ubuntu/lp-1764668-fix-check_guests_shutdown-loop.patch

 -- Christian Ehrhardt <email address hidden> Wed, 25 Apr 2018 09:26:12 +0200

Source diff to previous version
1764668 guest cleanup script fails to iterate

Version: 1.3.1-1ubuntu10.21 2018-04-12 10:07:24 UTC

  libvirt (1.3.1-1ubuntu10.21) xenial; urgency=medium

  * d/p/ubuntu/lp1688508-fix-variable-scope-in-in-check_guests_shutdown.patch:
    backport further upstream fixes that were identified on verification.
    Together with the former change this fixes (LP: #1688508)
  * d/p/ubuntu/lp1753604-nwfilter-fix-lock-order-deadlock.patch:
    fix intermittent deadlock in NWFilter handling (LP: #1753604)

Source diff to previous version
1688508 libvirt-guests.sh fails to shutdown guests in parallel
1753604 libvirt-bin nwfilter deadlock

Version: 1.3.1-1ubuntu10.19 2018-02-21 00:07:37 UTC

  libvirt (1.3.1-1ubuntu10.19) xenial-security; urgency=medium

  [ Leonidas S. Barbosa ]
  * SECURITY UPDATE: resource exhaustion resulting in DoS
    - debian/patches/CVE-2018-5748.patch: avoid DoS reading from
      QEMU monitor in src/qemu/qemu_monitor.c.
    - CVE-2018-5748
  * SECURITY UPDATE: Bypass authentication
    - debian/patches/CVE-2016-5008.patch: let empty default VNC
      password work as documented in src/qemu/qemu_hotplug.c.
    - CVE-2016-5008

  [ Marc Deslauriers ]
  * SECURITY UPDATE: code injection via libnss_dns.so
    - debian/patches/CVE-2018-6764-1.patch: determine the hostname on
      startup in src/util/virlog.c.
    - debian/patches/CVE-2018-6764-2.patch: fix syntax-check in
    - debian/patches/CVE-2018-6764-3.patch: fix deadlock obtaining hostname
      in cfg.mk, src/util/virlog.c.
    - CVE-2018-6764

 -- Marc Deslauriers <email address hidden> Fri, 16 Feb 2018 07:51:15 -0500

CVE-2018-5748 qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
CVE-2016-5008 libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers
CVE-2018-6764 guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init

About   -   Send Feedback to @ubuntu_updates