UbuntuUpdates.org

Package "libvirt"

Name: libvirt

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • nss plugins providing IP address resolution for virtual machines
  • Virtualization daemon LXC connection driver
  • Virtualization daemon glusterfs storage driver
  • Virtualization daemon iSCSI (libiscsi) storage driver

Latest version: 8.0.0-1ubuntu7.14
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "libvirt" in Jammy

Repository Area Version
base main 8.0.0-1ubuntu7
base universe 8.0.0-1ubuntu7
security main 8.0.0-1ubuntu7.10
security universe 8.0.0-1ubuntu7.10
updates main 8.0.0-1ubuntu7.14
proposed main 8.0.0-1ubuntu7.14
proposed universe 8.0.0-1ubuntu7.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 8.0.0-1ubuntu7.9 2024-04-10 02:06:48 UTC

  libvirt (8.0.0-1ubuntu7.9) jammy; urgency=medium

  * d/p/u/lp2059272-qemu-Fix-potential-crash-during-driver-cleanup.patch:
    On QEMU driver cleanup, release (stop) the worker thread pool _first_,
    before other data used by possibly running worker threads (LP: #2059272)

 -- Mauricio Faria de Oliveira <email address hidden> Wed, 27 Mar 2024 12:47:46 -0300

Source diff to previous version
2059272 libvirt domain is not listed/managed after libvirt restart with messages \

Version: 8.0.0-1ubuntu7.8 2024-01-09 22:06:59 UTC

  libvirt (8.0.0-1ubuntu7.8) jammy; urgency=medium

  * d/p/u/lp-2028057-*, d/libvirt0.install: Add named types and definitions,
    along with QEMU alias syncing for Intel SapphireRapids (LP: #2028057)

 -- Lena Voytek <email address hidden> Wed, 29 Nov 2023 14:52:52 -0700

Source diff to previous version
2028057 Jammy Libvirt Support for Intel Sapphire Rapids

Version: 8.0.0-1ubuntu7.7 2023-09-20 09:08:28 UTC

  libvirt (8.0.0-1ubuntu7.7) jammy; urgency=medium

  * When attempting to launch a VM with SGX enabled, there is an
    error reported that prevents VMs from being launched. Backport fix
    that fixes the main cause of that issue, which is the
    QOM_CPU_PATH macro and qom-get behavior (LP: #1982896).
    - d/p/b/qemu-monitor-json-get-cpux86-data-unexport.patch
    - d/p/b/qemu-process-update-and-verify-cpu-refactor-cleanup.patch
    - d/p/b/qemu-monitor-do-not-hardcode-qom-path-of-first-cpu.patch
    - d/p/b/qemu-domain-store-qompath-in-qemudomainvcpuprivate.patch
    - d/p/b/qemu-process-move-cpu-flag-querying-after-code-probing-cpus.patch
    - d/p/b/qemu-process-move-call-to-qemuprocessrefreshcpu-after-cpu-probe.patch
    - d/p/b/qemu-process-do-not-use-hardcoded-qom-path-for-cpu-for-probing-flags.patch

 -- Michal Maloszewski <email address hidden> Fri, 04 Aug 2023 10:42:25 +0200

Source diff to previous version
1982896 libvirtd cannot launch VMs with SGX enabled

Version: 8.0.0-1ubuntu7.6 2023-07-12 12:07:04 UTC

  libvirt (8.0.0-1ubuntu7.6) jammy; urgency=medium

  * d/p/u/lp-2024114-Avoid-memleak-in-virNodeDeviceGetPCIVPDDynamicCap.patch:
    fix memory leak PCI devices with VPD data (LP: #2024114)

 -- Rafael Lopez <email address hidden> Tue, 20 Jun 2023 11:54:15 +1000

Source diff to previous version
2024114 memory of libvirtd process grows steadily over time

Version: 8.0.0-1ubuntu7.5 2023-05-31 14:07:09 UTC

  libvirt (8.0.0-1ubuntu7.5) jammy-security; urgency=medium

  * SECURITY UPDATE: DoS via nwfilter driver
    - debian/patches/CVE-2022-0897.patch: fix crash when counting number of
      network filters in src/nwfilter/nwfilter_driver.c.
    - CVE-2022-0897
  * SECURITY UPDATE: DoS via memleak in SR-IOV PCI device capabilities
    - debian/patches/CVE-2023-2700.patch: resolve leak in
      virPCIVirtualFunctionList cleanup in src/util/virpci.c.
    - CVE-2023-2700

 -- Marc Deslauriers <email address hidden> Fri, 26 May 2023 10:08:33 -0400

CVE-2022-0897 A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the `driver->nwfilters` mutex before i
CVE-2023-2700 A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory



About   -   Send Feedback to @ubuntu_updates