ID FEDORA:D899E212B3 Type fedora Reporter Fedora Modified 2014-02-28T18:32:30
Description
Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support.
{"cve": [{"lastseen": "2020-10-03T12:46:08", "description": "The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the \"virsh memtune\" command.", "edition": 3, "cvss3": {}, "published": "2014-01-07T19:55:00", "title": "CVE-2013-6436", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6436"], "modified": "2015-01-03T01:03:00", "cpe": ["cpe:/a:redhat:libvirt:1.1.1", "cpe:/a:redhat:libvirt:1.1.2", "cpe:/a:redhat:libvirt:1.1.3", "cpe:/a:redhat:libvirt:1.0.5.5", "cpe:/a:redhat:libvirt:1.0.5.2", "cpe:/a:redhat:libvirt:1.1.0", "cpe:/a:redhat:libvirt:1.0.6", "cpe:/a:redhat:libvirt:1.2.0", "cpe:/a:redhat:libvirt:1.0.5", "cpe:/a:redhat:libvirt:1.0.5.3", "cpe:/a:redhat:libvirt:1.1.4", "cpe:/a:redhat:libvirt:1.0.5.1", "cpe:/a:redhat:libvirt:1.0.5.6", "cpe:/a:redhat:libvirt:1.0.5.4"], "id": "CVE-2013-6436", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6436", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:46:08", "description": "The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to \"paths under /proc/$PID/root\" and the virInitctlSetRunLevel function.", "edition": 3, "cvss3": {}, "published": "2014-04-15T23:55:00", "title": "CVE-2013-6456", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE"}, "impactScore": 7.8, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6456"], "modified": "2015-01-03T02:22:00", "cpe": ["cpe:/a:redhat:libvirt:1.1.1", "cpe:/a:redhat:libvirt:1.1.2", "cpe:/a:redhat:libvirt:1.1.3", "cpe:/a:redhat:libvirt:1.0.5.5", "cpe:/a:redhat:libvirt:1.0.3", "cpe:/a:redhat:libvirt:1.0.5.2", "cpe:/a:redhat:libvirt:1.0.2", "cpe:/a:redhat:libvirt:1.1.0", "cpe:/a:redhat:libvirt:1.2.1", "cpe:/a:redhat:libvirt:1.0.6", "cpe:/a:redhat:libvirt:1.2.0", "cpe:/a:redhat:libvirt:1.0.4", "cpe:/o:fedoraproject:fedora:20", "cpe:/a:redhat:libvirt:1.0.5", "cpe:/a:redhat:libvirt:1.0.5.3", "cpe:/a:redhat:libvirt:1.1.4", "cpe:/a:redhat:libvirt:1.0.5.1", "cpe:/a:redhat:libvirt:1.0.1", "cpe:/a:redhat:libvirt:1.0.5.6", "cpe:/a:redhat:libvirt:1.0.5.4"], "id": "CVE-2013-6456", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456", "cvss": {"score": 5.8, "vector": "AV:A/AC:M/Au:S/C:N/I:P/A:C"}, "cpe23": ["cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:48", "description": "Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.", "edition": 5, "cvss3": {}, "published": "2014-01-24T18:55:00", "title": "CVE-2013-6458", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.2, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.8, "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-6458"], "modified": "2015-01-03T02:19:00", "cpe": ["cpe:/a:redhat:libvirt:0.0.1", "cpe:/a:redhat:libvirt:0.8.2", "cpe:/a:redhat:libvirt:0.9.12", "cpe:/a:redhat:libvirt:0.8.4", "cpe:/a:redhat:libvirt:1.1.1", "cpe:/a:redhat:libvirt:0.9.11.3", "cpe:/a:redhat:libvirt:0.4.5", "cpe:/a:redhat:libvirt:0.9.6.1", "cpe:/a:redhat:libvirt:0.9.2", "cpe:/a:redhat:libvirt:0.10.2", "cpe:/a:redhat:libvirt:0.9.11.4", "cpe:/a:redhat:libvirt:0.7.6", "cpe:/a:redhat:libvirt:0.9.1", "cpe:/a:redhat:libvirt:0.10.2.5", "cpe:/a:redhat:libvirt:0.7.5", "cpe:/a:redhat:libvirt:0.10.2.2", "cpe:/a:redhat:libvirt:0.9.3", "cpe:/a:redhat:libvirt:0.5.1", "cpe:/a:redhat:libvirt:0.9.0", "cpe:/a:redhat:libvirt:1.1.2", "cpe:/a:redhat:libvirt:0.10.2.3", "cpe:/a:redhat:libvirt:0.3.1", "cpe:/a:redhat:libvirt:1.1.3", "cpe:/a:redhat:libvirt:0.10.2.8", "cpe:/a:redhat:libvirt:0.1.3", "cpe:/a:redhat:libvirt:0.9.9", "cpe:/a:redhat:libvirt:1.0.5.5", "cpe:/a:redhat:libvirt:0.2.1", "cpe:/a:redhat:libvirt:0.6.0", "cpe:/a:redhat:libvirt:0.10.2.4", "cpe:/a:redhat:libvirt:0.9.11.7", "cpe:/a:redhat:libvirt:0.10.2.7", "cpe:/a:redhat:libvirt:1.0.3", "cpe:/a:redhat:libvirt:0.8.3", "cpe:/a:redhat:libvirt:0.8.6", "cpe:/a:redhat:libvirt:0.9.11.6", "cpe:/a:redhat:libvirt:0.4.1", "cpe:/a:redhat:libvirt:0.7.0", "cpe:/a:redhat:libvirt:1.0.5.2", "cpe:/a:redhat:libvirt:0.0.4", "cpe:/a:redhat:libvirt:0.1.5", "cpe:/a:redhat:libvirt:0.4.4", "cpe:/a:redhat:libvirt:0.8.1", "cpe:/a:redhat:libvirt:0.0.5", "cpe:/a:redhat:libvirt:0.0.3", "cpe:/a:redhat:libvirt:1.0.2", "cpe:/a:redhat:libvirt:0.9.11.1", "cpe:/a:redhat:libvirt:1.1.0", "cpe:/a:redhat:libvirt:0.2.2", "cpe:/a:redhat:libvirt:0.9.6.2", "cpe:/a:redhat:libvirt:0.1.4", "cpe:/a:redhat:libvirt:1.0.0", "cpe:/a:redhat:libvirt:0.6.2", "cpe:/a:redhat:libvirt:0.3.0", "cpe:/a:redhat:libvirt:0.4.6", "cpe:/a:redhat:libvirt:1.0.6", "cpe:/a:redhat:libvirt:0.7.7", "cpe:/a:redhat:libvirt:1.2.0", "cpe:/a:redhat:libvirt:0.1.7", "cpe:/a:redhat:libvirt:0.2.0", "cpe:/a:redhat:libvirt:0.4.2", "cpe:/a:redhat:libvirt:1.0.4", "cpe:/a:redhat:libvirt:0.0.2", "cpe:/a:redhat:libvirt:0.6.3", "cpe:/a:redhat:libvirt:1.0.5", "cpe:/a:redhat:libvirt:1.0.5.3", "cpe:/a:redhat:libvirt:0.10.1", "cpe:/a:redhat:libvirt:0.10.2.1", "cpe:/a:redhat:libvirt:1.1.4", "cpe:/a:redhat:libvirt:0.7.4", "cpe:/a:redhat:libvirt:0.8.0", "cpe:/a:redhat:libvirt:0.9.6.3", "cpe:/a:redhat:libvirt:0.9.11", "cpe:/a:redhat:libvirt:0.0.6", "cpe:/a:redhat:libvirt:0.4.3", "cpe:/a:redhat:libvirt:0.5.0", "cpe:/a:redhat:libvirt:0.2.3", "cpe:/a:redhat:libvirt:0.9.13", "cpe:/a:redhat:libvirt:0.6.1", "cpe:/a:redhat:libvirt:0.9.10", "cpe:/a:redhat:libvirt:0.9.11.5", "cpe:/a:redhat:libvirt:0.1.9", "cpe:/a:redhat:libvirt:0.1.6", "cpe:/a:redhat:libvirt:0.9.7", "cpe:/a:redhat:libvirt:1.0.5.1", "cpe:/a:redhat:libvirt:0.9.11.2", "cpe:/a:redhat:libvirt:0.8.8", "cpe:/a:redhat:libvirt:0.7.1", "cpe:/a:redhat:libvirt:0.3.2", "cpe:/a:redhat:libvirt:0.10.0", "cpe:/a:redhat:libvirt:0.4.0", "cpe:/a:redhat:libvirt:0.10.2.6", "cpe:/a:redhat:libvirt:0.1.0", "cpe:/a:redhat:libvirt:1.0.1", "cpe:/a:redhat:libvirt:0.8.5", "cpe:/a:redhat:libvirt:1.0.5.6", "cpe:/a:redhat:libvirt:0.9.6", "cpe:/a:redhat:libvirt:0.7.2", "cpe:/a:redhat:libvirt:0.7.3", "cpe:/a:redhat:libvirt:0.6.5", "cpe:/a:redhat:libvirt:0.8.7", "cpe:/a:redhat:libvirt:0.6.4", "cpe:/a:redhat:libvirt:0.9.8", "cpe:/a:redhat:libvirt:0.9.11.8", "cpe:/a:redhat:libvirt:0.1.1", "cpe:/a:redhat:libvirt:0.1.8", "cpe:/a:redhat:libvirt:0.9.4", "cpe:/a:redhat:libvirt:0.3.3", "cpe:/a:redhat:libvirt:1.0.5.4", "cpe:/a:redhat:libvirt:0.9.5"], "id": "CVE-2013-6458", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6458", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:01:11", "description": "libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.", "edition": 3, "cvss3": {}, "published": "2014-01-24T18:55:00", "title": "CVE-2014-0028", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0028"], "modified": "2015-01-03T02:08:00", "cpe": ["cpe:/a:redhat:libvirt:1.1.1", "cpe:/a:redhat:libvirt:1.1.2", "cpe:/a:redhat:libvirt:1.1.3", "cpe:/a:redhat:libvirt:1.2.0", "cpe:/a:redhat:libvirt:1.1.4"], "id": "CVE-2014-0028", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0028", "cvss": {"score": 4.3, "vector": "AV:A/AC:M/Au:N/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:48:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "description": "Check for the Version of libvirt", "modified": "2017-07-10T00:00:00", "published": "2014-03-04T00:00:00", "id": "OPENVAS:867558", "href": "http://plugins.openvas.org/nasl.php?oid=867558", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-2864", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-2864\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867558);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-04 10:45:43 +0530 (Tue, 04 Mar 2014)\");\n script_cve_id(\"CVE-2013-6456\", \"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-0028\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-2864\");\n\n tag_insight = \"Libvirt is a C toolkit to interact with the virtualization capabilities\nof recent versions of Linux (and other OSes). The main package includes\nthe libvirtd server exporting the virtualization support.\n\";\n\n tag_affected = \"libvirt on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-2864\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\");\n script_summary(\"Check for the Version of libvirt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.1.3.4~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:ADJACENT_NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-03-04T00:00:00", "id": "OPENVAS:1361412562310867558", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867558", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-2864", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-2864\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867558\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-04 10:45:43 +0530 (Tue, 04 Mar 2014)\");\n script_cve_id(\"CVE-2013-6456\", \"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-0028\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-2864\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-2864\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.1.3.4~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0179", "CVE-2014-0028"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-05-26T00:00:00", "id": "OPENVAS:1361412562310867825", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867825", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-6586", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-6586\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867825\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-05-26 13:14:13 +0530 (Mon, 26 May 2014)\");\n script_cve_id(\"CVE-2014-0179\", \"CVE-2013-6456\", \"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-0028\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-6586\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-6586\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-May/133636.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.1.3.5~2.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2014-7823", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-3657", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-0028"], "description": "Check the version of libvirt", "modified": "2019-03-15T00:00:00", "published": "2014-11-23T00:00:00", "id": "OPENVAS:1361412562310868504", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868504", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-15228", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-15228\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868504\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-11-23 06:43:59 +0100 (Sun, 23 Nov 2014)\");\n script_cve_id(\"CVE-2014-3633\", \"CVE-2014-3657\", \"CVE-2014-7823\", \"CVE-2014-0179\",\n \"CVE-2013-6456\", \"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-0028\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-15228\");\n script_tag(name:\"summary\", value:\"Check the version of libvirt\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-15228\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-November/144735.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.1.3.8~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:16:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6457", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "description": "Check for the Version of libvirt", "modified": "2017-12-01T00:00:00", "published": "2014-02-03T00:00:00", "id": "OPENVAS:841696", "href": "http://plugins.openvas.org/nasl.php?oid=841696", "type": "openvas", "title": "Ubuntu Update for libvirt USN-2093-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2093_1.nasl 7957 2017-12-01 06:40:08Z santu $\n#\n# Ubuntu Update for libvirt USN-2093-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(841696);\n script_version(\"$Revision: 7957 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:40:08 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-03 14:02:09 +0530 (Mon, 03 Feb 2014)\");\n script_cve_id(\"CVE-2013-6436\", \"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2014-0028\", \"CVE-2014-1447\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for libvirt USN-2093-1\");\n\n tag_insight = \"Martin Kletzander discovered that libvirt incorrectly handled\nreading memory tunables from LXC guests. A local user could possibly use this\nflaw to cause libvirtd to crash, resulting in a denial of service. This issue\nonly affected Ubuntu 13.10. (CVE-2013-6436)\n\nDario Faggioli discovered that libvirt incorrectly handled the libxl\ndriver. A local user could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 13.10. (CVE-2013-6457)\n\nIt was discovered that libvirt contained multiple race conditions in block\ndevice handling. A remote read-only user could use this flaw to cause\nlibvirtd to crash, resulting in a denial of service. (CVE-2013-6458)\n\nEric Blake discovered that libvirt incorrectly handled certain ACLs. An\nattacker could use this flaw to possibly obtain certain sensitive\ninformation. This issue only affected Ubuntu 13.10. (CVE-2014-0028)\n\nJiri Denemark discovered that libvirt incorrectly handled keepalives. A\nremote attacker could possibly use this flaw to cause libvirtd to crash,\nresulting in a denial of service. (CVE-2014-1447)\";\n\n tag_affected = \"libvirt on Ubuntu 13.10 ,\n Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"2093-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-2093-1/\");\n script_summary(\"Check for the Version of libvirt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"0.9.8-2ubuntu17.17\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"0.9.8-2ubuntu17.17\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"1.1.1-0ubuntu8.5\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"1.1.1-0ubuntu8.5\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"0.9.13-0ubuntu12.6\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"0.9.13-0ubuntu12.6\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:ADJACENT_NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6457", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-02-03T00:00:00", "id": "OPENVAS:1361412562310841696", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841696", "type": "openvas", "title": "Ubuntu Update for libvirt USN-2093-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2093_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for libvirt USN-2093-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841696\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-03 14:02:09 +0530 (Mon, 03 Feb 2014)\");\n script_cve_id(\"CVE-2013-6436\", \"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2014-0028\", \"CVE-2014-1447\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for libvirt USN-2093-1\");\n\n script_tag(name:\"affected\", value:\"libvirt on Ubuntu 13.10,\n Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Martin Kletzander discovered that libvirt incorrectly handled\nreading memory tunables from LXC guests. A local user could possibly use this\nflaw to cause libvirtd to crash, resulting in a denial of service. This issue\nonly affected Ubuntu 13.10. (CVE-2013-6436)\n\nDario Faggioli discovered that libvirt incorrectly handled the libxl\ndriver. A local user could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 13.10. (CVE-2013-6457)\n\nIt was discovered that libvirt contained multiple race conditions in block\ndevice handling. A remote read-only user could use this flaw to cause\nlibvirtd to crash, resulting in a denial of service. (CVE-2013-6458)\n\nEric Blake discovered that libvirt incorrectly handled certain ACLs. An\nattacker could use this flaw to possibly obtain certain sensitive\ninformation. This issue only affected Ubuntu 13.10. (CVE-2014-0028)\n\nJiri Denemark discovered that libvirt incorrectly handled keepalives. A\nremote attacker could possibly use this flaw to cause libvirtd to crash,\nresulting in a denial of service. (CVE-2014-1447)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2093-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2093-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|13\\.10|12\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"0.9.8-2ubuntu17.17\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"0.9.8-2ubuntu17.17\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"1.1.1-0ubuntu8.5\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"1.1.1-0ubuntu8.5\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libvirt-bin\", ver:\"0.9.13-0ubuntu12.6\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libvirt0\", ver:\"0.9.13-0ubuntu12.6\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8136", "CVE-2013-6456", "CVE-2014-7823", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-3657", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-0028", "CVE-2015-0236"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-02-18T00:00:00", "id": "OPENVAS:1361412562310869019", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869019", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2015-1883", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2015-1883\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869019\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-02-18 05:41:09 +0100 (Wed, 18 Feb 2015)\");\n script_cve_id(\"CVE-2015-0236\", \"CVE-2014-8136\", \"CVE-2014-3633\", \"CVE-2014-3657\",\n \"CVE-2014-7823\", \"CVE-2014-0179\", \"CVE-2013-6456\", \"CVE-2013-6458\",\n \"CVE-2013-6436\", \"CVE-2014-0028\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvirt FEDORA-2015-1883\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-1883\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-February/150117.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.1.3.9~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4296", "CVE-2013-6457", "CVE-2013-5651", "CVE-2013-6456", "CVE-2013-7336", "CVE-2014-7823", "CVE-2013-4399", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-4292", "CVE-2013-6436", "CVE-2013-4400", "CVE-2013-4401", "CVE-2013-4297", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-0028", "CVE-2014-5177"], "description": "Gentoo Linux Local Security Checks GLSA 201412-04", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121290", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121290", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201412-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201412-04.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121290\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:28:02 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201412-04\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201412-04\");\n script_cve_id(\"CVE-2013-4292\", \"CVE-2013-4296\", \"CVE-2013-4297\", \"CVE-2013-4399\", \"CVE-2013-4400\", \"CVE-2013-4401\", \"CVE-2013-5651\", \"CVE-2013-6436\", \"CVE-2013-6456\", \"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2013-7336\", \"CVE-2014-0028\", \"CVE-2014-0179\", \"CVE-2014-1447\", \"CVE-2014-3633\", \"CVE-2014-5177\", \"CVE-2014-7823\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201412-04\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"app-emulation/libvirt\", unaffected: make_list(\"ge 1.2.9-r2\"), vulnerable: make_list(\"lt 1.2.9-r2\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4296", "CVE-2013-4291", "CVE-2013-5651", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2013-4311"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-01-27T00:00:00", "id": "OPENVAS:1361412562310867253", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867253", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-1090", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-1090\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867253\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-01-27 11:19:48 +0530 (Mon, 27 Jan 2014)\");\n script_cve_id(\"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-1447\", \"CVE-2013-4311\",\n \"CVE-2013-4296\", \"CVE-2013-4291\", \"CVE-2013-5651\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-1090\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-1090\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/127280.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.0.5.9~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:48:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4296", "CVE-2013-4291", "CVE-2013-5651", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2013-4311"], "description": "Check for the Version of libvirt", "modified": "2017-07-10T00:00:00", "published": "2014-01-27T00:00:00", "id": "OPENVAS:867253", "href": "http://plugins.openvas.org/nasl.php?oid=867253", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2014-1090", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libvirt FEDORA-2014-1090\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867253);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-01-27 11:19:48 +0530 (Mon, 27 Jan 2014)\");\n script_cve_id(\"CVE-2013-6458\", \"CVE-2013-6436\", \"CVE-2014-1447\", \"CVE-2013-4311\",\n \"CVE-2013-4296\", \"CVE-2013-4291\", \"CVE-2013-5651\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libvirt FEDORA-2014-1090\");\n\n tag_insight = \"Libvirt is a C toolkit to interact with the virtualization capabilities\nof recent versions of Linux (and other OSes). The main package includes\nthe libvirtd server exporting the virtualization support.\n\";\n\n tag_affected = \"libvirt on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-1090\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/127280.html\");\n script_summary(\"Check for the Version of libvirt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~1.0.5.9~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6436", "CVE-2013-6456", "CVE-2013-6458", "CVE-2014-0028", "CVE-2014-0179"], "description": "Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support. ", "modified": "2014-05-24T23:24:18", "published": "2014-05-24T23:24:18", "id": "FEDORA:BFE3F22371", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libvirt-1.1.3.5-2.fc20", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6436", "CVE-2013-6456", "CVE-2013-6458", "CVE-2014-0028", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-3657", "CVE-2014-7823"], "description": "Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support. ", "modified": "2014-11-22T12:37:22", "published": "2014-11-22T12:37:22", "id": "FEDORA:B8CF760C9802", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libvirt-1.1.3.8-1.fc20", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4400", "CVE-2013-6436", "CVE-2013-6458", "CVE-2014-0028", "CVE-2014-1447"], "description": "Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support. ", "modified": "2014-01-21T05:56:08", "published": "2014-01-21T05:56:08", "id": "FEDORA:B65E821F73", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libvirt-1.1.3.3-1.fc20", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6436", "CVE-2013-6456", "CVE-2013-6458", "CVE-2014-0028", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-3657", "CVE-2014-7823", "CVE-2014-8136", "CVE-2015-0236"], "description": "Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support. ", "modified": "2015-02-17T08:10:35", "published": "2015-02-17T08:10:35", "id": "FEDORA:B76936048D4F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: libvirt-1.1.3.9-1.fc20", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4291", "CVE-2013-4296", "CVE-2013-4311", "CVE-2013-5651", "CVE-2013-6436", "CVE-2013-6458", "CVE-2014-1447"], "description": "Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support. ", "modified": "2014-01-26T11:54:32", "published": "2014-01-26T11:54:32", "id": "FEDORA:50492212CC", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: libvirt-1.0.5.9-1.fc19", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:45:12", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6457", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "description": "Martin Kletzander discovered that libvirt incorrectly handled reading \nmemory tunables from LXC guests. A local user could possibly use this flaw \nto cause libvirtd to crash, resulting in a denial of service. This issue \nonly affected Ubuntu 13.10. (CVE-2013-6436)\n\nDario Faggioli discovered that libvirt incorrectly handled the libxl \ndriver. A local user could possibly use this flaw to cause libvirtd to \ncrash, resulting in a denial of service, or possibly execute arbitrary \ncode. This issue only affected Ubuntu 13.10. (CVE-2013-6457)\n\nIt was discovered that libvirt contained multiple race conditions in block \ndevice handling. A remote read-only user could use this flaw to cause \nlibvirtd to crash, resulting in a denial of service. (CVE-2013-6458)\n\nEric Blake discovered that libvirt incorrectly handled certain ACLs. An \nattacker could use this flaw to possibly obtain certain sensitive \ninformation. This issue only affected Ubuntu 13.10. (CVE-2014-0028)\n\nJiri Denemark discovered that libvirt incorrectly handled keepalives. A \nremote attacker could possibly use this flaw to cause libvirtd to crash, \nresulting in a denial of service. (CVE-2014-1447)", "edition": 5, "modified": "2014-01-30T00:00:00", "published": "2014-01-30T00:00:00", "id": "USN-2093-1", "href": "https://ubuntu.com/security/notices/USN-2093-1", "title": "libvirt vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:25:00", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6456", "CVE-2013-7336"], "description": "It was discovered that libvirt incorrectly handled symlinks when using the \nLXC driver. An attacker could possibly use this issue to delete host \ndevices, create arbitrary nodes, and shutdown or power off the host. \n(CVE-2013-6456)\n\nMarian Krcmarik discovered that libvirt incorrectly handled seamless SPICE \nmigrations. An attacker could possibly use this issue to cause a denial of \nservice. (CVE-2013-7336)", "edition": 5, "modified": "2014-05-07T00:00:00", "published": "2014-05-07T00:00:00", "id": "USN-2209-1", "href": "https://ubuntu.com/security/notices/USN-2209-1", "title": "libvirt vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.8, "vector": "AV:A/AC:M/Au:S/C:N/I:P/A:C"}}], "nessus": [{"lastseen": "2021-01-20T15:26:25", "description": "Martin Kletzander discovered that libvirt incorrectly handled reading\nmemory tunables from LXC guests. A local user could possibly use this\nflaw to cause libvirtd to crash, resulting in a denial of service.\nThis issue only affected Ubuntu 13.10. (CVE-2013-6436)\n\nDario Faggioli discovered that libvirt incorrectly handled the libxl\ndriver. A local user could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 13.10. (CVE-2013-6457)\n\nIt was discovered that libvirt contained multiple race conditions in\nblock device handling. A remote read-only user could use this flaw to\ncause libvirtd to crash, resulting in a denial of service.\n(CVE-2013-6458)\n\nEric Blake discovered that libvirt incorrectly handled certain ACLs.\nAn attacker could use this flaw to possibly obtain certain sensitive\ninformation. This issue only affected Ubuntu 13.10. (CVE-2014-0028)\n\nJiri Denemark discovered that libvirt incorrectly handled keepalives.\nA remote attacker could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service. (CVE-2014-1447).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-01-31T00:00:00", "title": "Ubuntu 12.04 LTS / 12.10 / 13.10 : libvirt vulnerabilities (USN-2093-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6457", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2014-0028"], "modified": "2014-01-31T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libvirt-bin", "cpe:/o:canonical:ubuntu_linux:13.10", "p-cpe:/a:canonical:ubuntu_linux:libvirt0", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-2093-1.NASL", "href": "https://www.tenable.com/plugins/nessus/72232", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2093-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72232);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6436\", \"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2014-0028\", \"CVE-2014-1447\");\n script_bugtraq_id(64549, 64723, 64945, 64963, 65004);\n script_xref(name:\"USN\", value:\"2093-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 / 13.10 : libvirt vulnerabilities (USN-2093-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Martin Kletzander discovered that libvirt incorrectly handled reading\nmemory tunables from LXC guests. A local user could possibly use this\nflaw to cause libvirtd to crash, resulting in a denial of service.\nThis issue only affected Ubuntu 13.10. (CVE-2013-6436)\n\nDario Faggioli discovered that libvirt incorrectly handled the libxl\ndriver. A local user could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 13.10. (CVE-2013-6457)\n\nIt was discovered that libvirt contained multiple race conditions in\nblock device handling. A remote read-only user could use this flaw to\ncause libvirtd to crash, resulting in a denial of service.\n(CVE-2013-6458)\n\nEric Blake discovered that libvirt incorrectly handled certain ACLs.\nAn attacker could use this flaw to possibly obtain certain sensitive\ninformation. This issue only affected Ubuntu 13.10. (CVE-2014-0028)\n\nJiri Denemark discovered that libvirt incorrectly handled keepalives.\nA remote attacker could possibly use this flaw to cause libvirtd to\ncrash, resulting in a denial of service. (CVE-2014-1447).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2093-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt-bin and / or libvirt0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libvirt-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libvirt0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/01/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10|13\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10 / 13.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"libvirt-bin\", pkgver:\"0.9.8-2ubuntu17.17\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"libvirt0\", pkgver:\"0.9.8-2ubuntu17.17\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"libvirt-bin\", pkgver:\"0.9.13-0ubuntu12.6\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"libvirt0\", pkgver:\"0.9.13-0ubuntu12.6\")) flag++;\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libvirt-bin\", pkgver:\"1.1.1-0ubuntu8.5\")) flag++;\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libvirt0\", pkgver:\"1.1.1-0ubuntu8.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt-bin / libvirt0\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:12:01", "description": " - Rebased to version 1.1.3.3\n\n - Fix crash in virDBusAddWatch (bz #885445)\n\n - Cleanup migration ports when migration is cancelled\n (bz #1018530)\n\n - Fix virt-login-shell (bz #1054479)\n\n - CVE-2013-6458 libvirt: qemu: job usage issue in\n several APIs leading to libvirtd crash (bz #1054206,\n bz #1048631)\n\n - CVE-2013-6436 libvirt: crash in\n lxcDomainGetMemoryParameters (bz #1049136, bz\n #1042252)\n\n - CVE-2014-0028 libvirt: event registration bypasses\n domain:getattr ACL (bz #1054203, bz #1048637)\n\n - CVE-2014-1447: libvirt: denial of service with\n keepalive (bz 1052957, bz 1054808)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-01-21T00:00:00", "title": "Fedora 20 : libvirt-1.1.3.3-1.fc20 (2014-1042)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436", "CVE-2013-4400", "CVE-2014-0028"], "modified": "2014-01-21T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:libvirt"], "id": "FEDORA_2014-1042.NASL", "href": "https://www.tenable.com/plugins/nessus/72049", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1042.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72049);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-4400\");\n script_xref(name:\"FEDORA\", value:\"2014-1042\");\n\n script_name(english:\"Fedora 20 : libvirt-1.1.3.3-1.fc20 (2014-1042)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Rebased to version 1.1.3.3\n\n - Fix crash in virDBusAddWatch (bz #885445)\n\n - Cleanup migration ports when migration is cancelled\n (bz #1018530)\n\n - Fix virt-login-shell (bz #1054479)\n\n - CVE-2013-6458 libvirt: qemu: job usage issue in\n several APIs leading to libvirtd crash (bz #1054206,\n bz #1048631)\n\n - CVE-2013-6436 libvirt: crash in\n lxcDomainGetMemoryParameters (bz #1049136, bz\n #1042252)\n\n - CVE-2014-0028 libvirt: event registration bypasses\n domain:getattr ACL (bz #1054203, bz #1048637)\n\n - CVE-2014-1447: libvirt: denial of service with\n keepalive (bz 1052957, bz 1054808)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1054479\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=885445\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-January/126930.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d025c43f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"libvirt-1.1.3.3-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:12:02", "description": " - Rebased to version 1.0.5.9\n\n - Fix crash in virDBusAddWatch (bz #885445)\n\n - Cleanup migration ports when migration is cancelled\n (bz #1018530)\n\n - CVE-2013-6458 libvirt: qemu: job usage issue in\n several APIs leading to libvirtd crash (bz #1054206,\n bz #1048631)\n\n - CVE-2013-6436 libvirt: crash in\n lxcDomainGetMemoryParameters (bz #1049136, bz\n #1042252)\n\n - CVE-2014-1447: libvirt: denial of service with\n keepalive (bz 1052957, bz 1054808)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-01-27T00:00:00", "title": "Fedora 19 : libvirt-1.0.5.9-1.fc19 (2014-1090)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1447", "CVE-2013-6458", "CVE-2013-6436"], "modified": "2014-01-27T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:libvirt"], "id": "FEDORA_2014-1090.NASL", "href": "https://www.tenable.com/plugins/nessus/72137", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1090.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72137);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6458\");\n script_bugtraq_id(64723);\n script_xref(name:\"FEDORA\", value:\"2014-1090\");\n\n script_name(english:\"Fedora 19 : libvirt-1.0.5.9-1.fc19 (2014-1090)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Rebased to version 1.0.5.9\n\n - Fix crash in virDBusAddWatch (bz #885445)\n\n - Cleanup migration ports when migration is cancelled\n (bz #1018530)\n\n - CVE-2013-6458 libvirt: qemu: job usage issue in\n several APIs leading to libvirtd crash (bz #1054206,\n bz #1048631)\n\n - CVE-2013-6436 libvirt: crash in\n lxcDomainGetMemoryParameters (bz #1049136, bz\n #1042252)\n\n - CVE-2014-1447: libvirt: denial of service with\n keepalive (bz 1052957, bz 1054808)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1018530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1054206\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-January/127280.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b4f0349d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"libvirt-1.0.5.9-1.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T12:27:22", "description": "This update fixes the following security and non security issues with\nlibvirt :\n\n - bnc#857492: Fix libvirtd crash when hot-plugging disks\n for qemu domains (CVE-2013-6458)\n\n - bnc#858817: Don't crash if a connection closes early\n (CVE-2014-1447)\n\n - bnc#858824: avoid crashing libvirtd when calling `virsh\n numatune' on inactive Xen libxl domain (CVE-2013-6457)\n\n - bnc#859051: filter global events by domain:getattr ACL\n (CVE-2014-0028)\n\n - bnc#817407: Add CAP_SYS_PACCT capability to libvirtd\n AppArmor profile\n\n - bnc#859041: Following the upstream pattern, introduce\n the daemon-config-network subpackage to handle defining\n the default network\n\n - bnc#857271: Fix initialization of emulated NICs\n\n - bnc#857271: Fix potential segfault in libxl driver when\n domain create fails", "edition": 19, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libvirt (openSUSE-SU-2014:0268-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6457", "CVE-2014-1447", "CVE-2013-6458", "CVE-2014-0028"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml", "p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-devel-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-config-network", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage", "p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl", "p-cpe:/a:novell:opensuse:libvirt-python-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-lock-sanlock", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen", "p-cpe:/a:novell:opensuse:libvirt-client-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-qemu", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-devel", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-login-shell", "p-cpe:/a:novell:opensuse:libvirt-daemon-uml", "p-cpe:/a:novell:opensuse:libvirt", "p-cpe:/a:novell:opensuse:libvirt-python", "p-cpe:/a:novell:opensuse:libvirt-daemon-lxc", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface", "p-cpe:/a:novell:opensuse:libvirt-daemon-xen", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-vbox", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret", "p-cpe:/a:novell:opensuse:libvirt-debugsource", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network", "p-cpe:/a:novell:opensuse:libvirt-daemon"], "id": "OPENSUSE-2014-154.NASL", "href": "https://www.tenable.com/plugins/nessus/75266", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-154.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75266);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2014-0028\", \"CVE-2014-1447\");\n\n script_name(english:\"openSUSE Security Update : libvirt (openSUSE-SU-2014:0268-1)\");\n script_summary(english:\"Check for the openSUSE-2014-154 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the following security and non security issues with\nlibvirt :\n\n - bnc#857492: Fix libvirtd crash when hot-plugging disks\n for qemu domains (CVE-2013-6458)\n\n - bnc#858817: Don't crash if a connection closes early\n (CVE-2014-1447)\n\n - bnc#858824: avoid crashing libvirtd when calling `virsh\n numatune' on inactive Xen libxl domain (CVE-2013-6457)\n\n - bnc#859051: filter global events by domain:getattr ACL\n (CVE-2014-0028)\n\n - bnc#817407: Add CAP_SYS_PACCT capability to libvirtd\n AppArmor profile\n\n - bnc#859041: Following the upstream pattern, introduce\n the daemon-config-network subpackage to handle defining\n the default network\n\n - bnc#857271: Fix initialization of emulated NICs\n\n - bnc#857271: Fix potential segfault in libxl driver when\n domain create fails\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=817407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=857271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=857492\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=858817\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=858824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=859041\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=859051\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-config-network\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-uml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-vbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-login-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-python-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-client-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-client-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-config-network-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-config-nwfilter-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-interface-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-interface-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-lxc-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-lxc-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-network-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-network-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nodedev-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nodedev-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nwfilter-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nwfilter-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-qemu-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-qemu-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-secret-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-secret-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-storage-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-storage-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-uml-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-uml-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-vbox-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-vbox-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-lxc-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-qemu-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-uml-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-vbox-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-debugsource-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-devel-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-lock-sanlock-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-lock-sanlock-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-login-shell-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-login-shell-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-python-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-python-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-client-32bit-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-client-debuginfo-32bit-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-libxl-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-libxl-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-xen-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-xen-debuginfo-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-xen-1.1.2-2.18.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-devel-32bit-1.1.2-2.18.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt / libvirt-client / libvirt-client-32bit / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:41:27", "description": "This update fixes a crash in LXC's memtune code. CVE-2013-6436 has\nbeen assigned to this issue.", "edition": 18, "published": "2014-01-31T00:00:00", "title": "SuSE 11.3 Security Update : libvirt (SAT Patch Number 8705)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6436"], "modified": "2014-01-31T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:libvirt-client", "p-cpe:/a:novell:suse_linux:11:libvirt", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:libvirt-client-32bit", "p-cpe:/a:novell:suse_linux:11:libvirt-lock-sanlock", "p-cpe:/a:novell:suse_linux:11:libvirt-python", "p-cpe:/a:novell:suse_linux:11:libvirt-doc"], "id": "SUSE_11_LIBVIRT-131223.NASL", "href": "https://www.tenable.com/plugins/nessus/72229", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72229);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6436\");\n\n script_name(english:\"SuSE 11.3 Security Update : libvirt (SAT Patch Number 8705)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a crash in LXC's memtune code. CVE-2013-6436 has\nbeen assigned to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=841720\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=842016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=854486\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-6436.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 8705.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt-client-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt-lock-sanlock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libvirt-python\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, \"SuSE 11.3\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"libvirt-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"libvirt-client-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"libvirt-doc-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"libvirt-python-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-client-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-client-32bit-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-doc-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-python-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libvirt-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libvirt-client-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libvirt-doc-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libvirt-lock-sanlock-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"libvirt-python-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, cpu:\"s390x\", reference:\"libvirt-client-32bit-1.0.5.8-0.7.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, cpu:\"x86_64\", reference:\"libvirt-client-32bit-1.0.5.8-0.7.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-20T12:28:09", "description": " - CVE-2013-6436: Fix crashes in lxc memtune code, one of\n which results in DoS f8c1cb90-CVE-2013-6436.patch,\n 9faf3f29-LXC-memtune.patch bnc#854486\n\n - Backported upstream patch to fix LXC container failing\n start. bnc#855239\n\n - Building with polkit support requires polkit-devel\n bnc#854144", "edition": 18, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libvirt (openSUSE-SU-2014:0010-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6436"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml", "p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-devel-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage", "p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl", "p-cpe:/a:novell:opensuse:libvirt-python-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-lock-sanlock", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen", "p-cpe:/a:novell:opensuse:libvirt-client-32bit", "p-cpe:/a:novell:opensuse:libvirt-daemon-qemu", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-devel", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-login-shell", "p-cpe:/a:novell:opensuse:libvirt-daemon-uml", "p-cpe:/a:novell:opensuse:libvirt", "p-cpe:/a:novell:opensuse:libvirt-python", "p-cpe:/a:novell:opensuse:libvirt-daemon-lxc", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface", "p-cpe:/a:novell:opensuse:libvirt-daemon-xen", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-vbox", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-client-debuginfo", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret", "p-cpe:/a:novell:opensuse:libvirt-debugsource", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network", "p-cpe:/a:novell:opensuse:libvirt-daemon"], "id": "OPENSUSE-2014-8.NASL", "href": "https://www.tenable.com/plugins/nessus/75411", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-8.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75411);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6436\");\n\n script_name(english:\"openSUSE Security Update : libvirt (openSUSE-SU-2014:0010-1)\");\n script_summary(english:\"Check for the openSUSE-2014-8 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - CVE-2013-6436: Fix crashes in lxc memtune code, one of\n which results in DoS f8c1cb90-CVE-2013-6436.patch,\n 9faf3f29-LXC-memtune.patch bnc#854486\n\n - Backported upstream patch to fix LXC container failing\n start. bnc#855239\n\n - Building with polkit support requires polkit-devel\n bnc#854144\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=854144\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=854486\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=855239\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-01/msg00004.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-client-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-xen-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-uml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-vbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-daemon-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-login-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-login-shell-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvirt-python-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-client-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-client-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-config-nwfilter-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-interface-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-interface-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-lxc-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-lxc-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-network-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-network-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nodedev-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nodedev-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nwfilter-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-nwfilter-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-qemu-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-qemu-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-secret-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-secret-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-storage-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-storage-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-uml-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-uml-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-vbox-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-driver-vbox-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-lxc-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-qemu-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-uml-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-daemon-vbox-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-debugsource-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-devel-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-lock-sanlock-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-lock-sanlock-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-login-shell-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-login-shell-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-python-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libvirt-python-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-client-32bit-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-client-debuginfo-32bit-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-libxl-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-libxl-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-xen-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-xen-debuginfo-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-daemon-xen-1.1.2-2.14.2\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libvirt-devel-32bit-1.1.2-2.14.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt / libvirt-client / libvirt-client-32bit / etc\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:12:33", "description": " - Rebased to version 1.1.3.4\n\n - Fix domain events when ACLs are used (bz #1058839)\n\n - CVE-2013-6456: unsafe usage of paths under /proc//root\n (bz #1048628, bz #1048627)\n\n - Fix baselineCPU EXPAND_FEATURES (bz #1049391)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-03-02T00:00:00", "title": "Fedora 20 : libvirt-1.1.3.4-1.fc20 (2014-2864)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456"], "modified": "2014-03-02T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:libvirt"], "id": "FEDORA_2014-2864.NASL", "href": "https://www.tenable.com/plugins/nessus/72753", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-2864.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72753);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-6456\");\n script_bugtraq_id(65743);\n script_xref(name:\"FEDORA\", value:\"2014-2864\");\n\n script_name(english:\"Fedora 20 : libvirt-1.1.3.4-1.fc20 (2014-2864)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Rebased to version 1.1.3.4\n\n - Fix domain events when ACLs are used (bz #1058839)\n\n - CVE-2013-6456: unsafe usage of paths under /proc//root\n (bz #1048628, bz #1048627)\n\n - Fix baselineCPU EXPAND_FEATURES (bz #1049391)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1048627\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5fde69f2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"libvirt-1.1.3.4-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:A/AC:M/Au:S/C:N/I:P/A:C"}}, {"lastseen": "2021-01-07T10:56:30", "description": "The remote host is affected by the vulnerability described in GLSA-201412-04\n(libvirt: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in libvirt. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker may be able to cause a Denial of Service or cause\n information leakage. A local attacker may be able to escalate privileges,\n cause a Denial of Service or possibly execute arbitrary code.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 20, "published": "2014-12-09T00:00:00", "title": "GLSA-201412-04 : libvirt: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4296", "CVE-2013-6457", "CVE-2013-5651", "CVE-2013-6456", "CVE-2013-7336", "CVE-2014-7823", "CVE-2013-4399", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-4292", "CVE-2013-6436", "CVE-2013-4400", "CVE-2013-4401", "CVE-2013-4297", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-0028", "CVE-2014-5177"], "modified": "2014-12-09T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:libvirt"], "id": "GENTOO_GLSA-201412-04.NASL", "href": "https://www.tenable.com/plugins/nessus/79814", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201412-04.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79814);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-4292\", \"CVE-2013-4296\", \"CVE-2013-4297\", \"CVE-2013-4399\", \"CVE-2013-4400\", \"CVE-2013-4401\", \"CVE-2013-5651\", \"CVE-2013-6436\", \"CVE-2013-6456\", \"CVE-2013-6457\", \"CVE-2013-6458\", \"CVE-2013-7336\", \"CVE-2014-0028\", \"CVE-2014-0179\", \"CVE-2014-1447\", \"CVE-2014-3633\", \"CVE-2014-5177\", \"CVE-2014-7823\");\n script_bugtraq_id(62070, 62510, 62576, 62791, 62972, 63324, 63325, 64723, 64945, 64963, 65004, 65743, 66304, 67289, 69033, 70186, 71095);\n script_xref(name:\"GLSA\", value:\"201412-04\");\n\n script_name(english:\"GLSA-201412-04 : libvirt: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201412-04\n(libvirt: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in libvirt. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker may be able to cause a Denial of Service or cause\n information leakage. A local attacker may be able to escalate privileges,\n cause a Denial of Service or possibly execute arbitrary code.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201412-04\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All libvirt users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/libvirt-1.2.9-r2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-emulation/libvirt\", unaffected:make_list(\"ge 1.2.9-r2\"), vulnerable:make_list(\"lt 1.2.9-r2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt\");\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:54:36", "description": "Multiple vulnerabilities has been discovered and corrected in \nlibvirt :\n\nThe LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1\nallows local users to (1) delete arbitrary host devices via the\nvirDomainDeviceDettach API and a symlink attack on /dev in the\ncontainer; (2) create arbitrary nodes (mknod) via the\nvirDomainDeviceAttach API and a symlink attack on /dev in the\ncontainer; and cause a denial of service (shutdown or reboot host OS)\nvia the (3) virDomainShutdown or (4) virDomainReboot API and a symlink\nattack on /dev/initctl in the container, related to paths under\n/proc//root and the virInitctlSetRunLevel function (CVE-2013-6456).\n\nlibvirt was patched to prevent expansion of entities when parsing XML\nfiles. This vulnerability allowed malicious users to read arbitrary\nfiles or cause a denial of service (CVE-2014-0179).\n\nThe updated packages have been upgraded to the 1.1.3.5 version and\npatched to correct these issues.", "edition": 25, "published": "2014-05-19T00:00:00", "title": "Mandriva Linux Security Advisory : libvirt (MDVSA-2014:097)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2014-0179"], "modified": "2014-05-19T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:lib64virt-devel", "p-cpe:/a:mandriva:linux:python-libvirt", "p-cpe:/a:mandriva:linux:lib64virt0", "p-cpe:/a:mandriva:linux:libvirt-utils"], "id": "MANDRIVA_MDVSA-2014-097.NASL", "href": "https://www.tenable.com/plugins/nessus/74075", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:097. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74075);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-6456\", \"CVE-2014-0179\");\n script_bugtraq_id(65743, 67289);\n script_xref(name:\"MDVSA\", value:\"2014:097\");\n\n script_name(english:\"Mandriva Linux Security Advisory : libvirt (MDVSA-2014:097)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been discovered and corrected in \nlibvirt :\n\nThe LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1\nallows local users to (1) delete arbitrary host devices via the\nvirDomainDeviceDettach API and a symlink attack on /dev in the\ncontainer; (2) create arbitrary nodes (mknod) via the\nvirDomainDeviceAttach API and a symlink attack on /dev in the\ncontainer; and cause a denial of service (shutdown or reboot host OS)\nvia the (3) virDomainShutdown or (4) virDomainReboot API and a symlink\nattack on /dev/initctl in the container, related to paths under\n/proc//root and the virInitctlSetRunLevel function (CVE-2013-6456).\n\nlibvirt was patched to prevent expansion of entities when parsing XML\nfiles. This vulnerability allowed malicious users to read arbitrary\nfiles or cause a denial of service (CVE-2014-0179).\n\nThe updated packages have been upgraded to the 1.1.3.5 version and\npatched to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.libvirt.org/2014/0003.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64virt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64virt0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libvirt-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:python-libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64virt-devel-1.1.3.5-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64virt0-1.1.3.5-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"libvirt-utils-1.1.3.5-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"python-libvirt-1.1.3.5-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:A/AC:M/Au:S/C:N/I:P/A:C"}}, {"lastseen": "2021-01-20T15:27:12", "description": "It was discovered that libvirt incorrectly handled symlinks when using\nthe LXC driver. An attacker could possibly use this issue to delete\nhost devices, create arbitrary nodes, and shutdown or power off the\nhost. (CVE-2013-6456)\n\nMarian Krcmarik discovered that libvirt incorrectly handled seamless\nSPICE migrations. An attacker could possibly use this issue to cause a\ndenial of service. (CVE-2013-7336).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 21, "published": "2014-05-09T00:00:00", "title": "Ubuntu 13.10 : libvirt vulnerabilities (USN-2209-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-6456", "CVE-2013-7336"], "modified": "2014-05-09T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libvirt-bin", "cpe:/o:canonical:ubuntu_linux:13.10", "p-cpe:/a:canonical:ubuntu_linux:libvirt0"], "id": "UBUNTU_USN-2209-1.NASL", "href": "https://www.tenable.com/plugins/nessus/73940", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2209-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73940);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-6456\", \"CVE-2013-7336\");\n script_bugtraq_id(65743, 66304);\n script_xref(name:\"USN\", value:\"2209-1\");\n\n script_name(english:\"Ubuntu 13.10 : libvirt vulnerabilities (USN-2209-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that libvirt incorrectly handled symlinks when using\nthe LXC driver. An attacker could possibly use this issue to delete\nhost devices, create arbitrary nodes, and shutdown or power off the\nhost. (CVE-2013-6456)\n\nMarian Krcmarik discovered that libvirt incorrectly handled seamless\nSPICE migrations. An attacker could possibly use this issue to cause a\ndenial of service. (CVE-2013-7336).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2209-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt-bin and / or libvirt0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libvirt-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libvirt0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/04/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(13\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 13.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libvirt-bin\", pkgver:\"1.1.1-0ubuntu8.11\")) flag++;\nif (ubuntu_check(osver:\"13.10\", pkgname:\"libvirt0\", pkgver:\"1.1.1-0ubuntu8.11\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt-bin / libvirt0\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:A/AC:M/Au:S/C:N/I:P/A:C"}}], "seebug": [{"lastseen": "2017-11-19T17:37:19", "description": "CVE ID:CVE-2013-6436\r\n\r\nLibvirt\u5e93\u662f\u4e00\u6b3e\u5b9e\u73b0Linux\u865a\u62df\u5316\u529f\u80fd\u7684Linux API\uff0c\u5b83\u652f\u6301\u5404\u79cdHypervisor\uff0c\u5305\u62ecXen\u548cKVM\uff0c\u4ee5\u53caQEMU\u548c\u7528\u4e8e\u5176\u4ed6\u64cd\u4f5c\u7cfb\u7edf\u7684\u4e00\u4e9b\u865a\u62df\u4ea7\u54c1\u3002\r\n\r\nLibvirt\u4e2d"lxcDomainGetMemoryParameters()"\u51fd\u6570(lxc/lxc_driver.c)\u5b58\u5728\u4e00\u4e9b\u9519\u8bef\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5411\u6ca1\u6709\u8fd0\u884c\u7684LXC\u57df\u53d1\u9001"virsh memtune"\u547d\u4ee4\u89e6\u53d1\u7a7a\u6307\u9488\u5f15\u7528\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\n0\nlibvirt 1.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nLibvirt\r\n-----\r\n\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\n\r\nhttp://libvirt.org/git/?p=libvirt.git;a=commit;h=f8c1cb90213508c4f32549023b0572ed774e48aa", "published": "2013-12-30T00:00:00", "type": "seebug", "title": "libvirt "lxcDomainGetMemoryParameters()"\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2013-6436"], "modified": "2013-12-30T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-61237", "id": "SSV:61237", "sourceData": "", "sourceHref": "", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:42", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4296", "CVE-2013-6457", "CVE-2013-5651", "CVE-2013-6456", "CVE-2013-7336", "CVE-2014-7823", "CVE-2013-4399", "CVE-2014-1447", "CVE-2013-6458", "CVE-2013-4292", "CVE-2013-6436", "CVE-2013-4400", "CVE-2013-4401", "CVE-2013-4297", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-0028", "CVE-2014-5177"], "edition": 1, "description": "### Background\n\nlibvirt is a C toolkit for manipulating virtual machines.\n\n### Description\n\nMultiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker may be able to cause a Denial of Service or cause information leakage. A local attacker may be able to escalate privileges, cause a Denial of Service or possibly execute arbitrary code. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll libvirt users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/libvirt-1.2.9-r2\"", "modified": "2014-12-08T00:00:00", "published": "2014-12-08T00:00:00", "id": "GLSA-201412-04", "href": "https://security.gentoo.org/glsa/201412-04", "type": "gentoo", "title": "libvirt: Multiple vulnerabilities", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "cvelist": ["CVE-2013-6456", "CVE-2014-0179"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:097\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : libvirt\r\n Date : May 16, 2014\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been discovered and corrected in libvirt:\r\n \r\n The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through\r\n 1.2.1 allows local users to (1) delete arbitrary host devices\r\n via the virDomainDeviceDettach API and a symlink attack on /dev\r\n in the container; (2) create arbitrary nodes (mknod) via the\r\n virDomainDeviceAttach API and a symlink attack on /dev in the\r\n container; and cause a denial of service (shutdown or reboot host\r\n OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a\r\n symlink attack on /dev/initctl in the container, related to paths under\r\n /proc//root and the virInitctlSetRunLevel function (CVE-2013-6456).\r\n \r\n libvirt was patched to prevent expansion of entities when parsing XML\r\n files. This vulnerability allowed malicious users to read arbitrary\r\n files or cause a denial of service (CVE-2014-0179).\r\n \r\n The updated packages have been upgraded to the 1.1.3.5 version and\r\n patched to correct these issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179\r\n http://security.libvirt.org/2014/0003.html\r\n http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n d32a9d1b0e2f0d41fd38ca91678a14bd mbs1/x86_64/lib64virt0-1.1.3.5-1.mbs1.x86_64.rpm\r\n e808eb120fe42eba162c3be07bde1d60 mbs1/x86_64/lib64virt-devel-1.1.3.5-1.mbs1.x86_64.rpm\r\n 5957f991a7942b196a6754430c75e77c mbs1/x86_64/libvirt-utils-1.1.3.5-1.mbs1.x86_64.rpm\r\n 0787c1c3f963848334500deb9a4e8416 mbs1/x86_64/python-libvirt-1.1.3.5-1.mbs1.x86_64.rpm \r\n 1abef0303ae5d38c128a96cba3e7c589 mbs1/SRPMS/libvirt-1.1.3.5-1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFTdelbmqjQ0CJFipgRAu7JAKCw9pUcJ0Ex3y4wHSVbqh6JXOPQ6gCgstCy\r\njzarMyA06kq7pPYrm9T0a08=\r\n=12bW\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-06-02T00:00:00", "published": "2014-06-02T00:00:00", "id": "SECURITYVULNS:DOC:30782", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30782", "title": "[ MDVSA-2014:097 ] libvirt", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "cvelist": ["CVE-2013-6456", "CVE-2013-7336"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2209-1\r\nMay 07, 2014\r\n\r\nlibvirt vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 13.10\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in libvirt.\r\n\r\nSoftware Description:\r\n- libvirt: Libvirt virtualization toolkit\r\n\r\nDetails:\r\n\r\nIt was discovered that libvirt incorrectly handled symlinks when using the\r\nLXC driver. An attacker could possibly use this issue to delete host\r\ndevices, create arbitrary nodes, and shutdown or power off the host.\r\n(CVE-2013-6456)\r\n\r\nMarian Krcmarik discovered that libvirt incorrectly handled seamless SPICE\r\nmigrations. An attacker could possibly use this issue to cause a denial of\r\nservice. (CVE-2013-7336)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 13.10:\r\n libvirt-bin 1.1.1-0ubuntu8.11\r\n libvirt0 1.1.1-0ubuntu8.11\r\n\r\nAfter a standard system update you need to reboot your computer to make all\r\nthe necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2209-1\r\n CVE-2013-6456, CVE-2013-7336\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/libvirt/1.1.1-0ubuntu8.11\r\n\r\n\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2014-05-07T00:00:00", "published": "2014-05-07T00:00:00", "id": "SECURITYVULNS:DOC:30703", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30703", "title": "[USN-2209-1] libvirt vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2013-6456", "CVE-2013-7336"], "description": "DoS, smbolic links vulnerability.", "edition": 1, "modified": "2014-05-07T00:00:00", "published": "2014-05-07T00:00:00", "id": "SECURITYVULNS:VULN:13755", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13755", "title": "libvirt security vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2013-6456", "CVE-2014-0179"], "description": "No description provided", "edition": 1, "modified": "2014-06-02T00:00:00", "published": "2014-06-02T00:00:00", "id": "SECURITYVULNS:VULN:13805", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13805", "title": "libvirt XXE vulnerability", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:ADJACENT_NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:50", "bulletinFamily": "software", "cvelist": ["CVE-2014-1447", "CVE-2013-6458"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2846-1 security@debian.org\r\nhttp://www.debian.org/security/ Moritz Muehlenhoff\r\nJanuary 17, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : libvirt\r\nVulnerability : several\r\nProblem type : remote\r\nDebian-specific: no\r\nCVE ID : CVE-2013-6458 CVE-2014-1447\r\n\r\nMultiple security issues have been found in Libvirt, a virtualisation\r\nabstraction library:\r\n\r\nCVE-2013-6458\r\n\r\n It was discovered that insecure job usage could lead to denial of\r\n service against libvirtd.\r\n\r\nCVE-2014-1447\r\n\r\n It was discovered that a race condition in keepalive handling could\r\n lead to denial of service against libvirtd.\r\n\r\nFor the stable distribution (wheezy), these problems have been fixed in\r\nversion 0.9.12.3-1. This bugfix point release also addresses some \r\nadditional bugfixes.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 1.2.1-1.\r\n\r\nWe recommend that you upgrade your libvirt packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n\r\niEYEARECAAYFAlLZg3wACgkQXm3vHE4uylo0MgCgn8enbxsu2ks6iM4YGcVwI+xY\r\nuwoAoNK2mEZUV+SYCVPBVrrYnthuXqgB\r\n=ZkzN\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-01-29T00:00:00", "published": "2014-01-29T00:00:00", "id": "SECURITYVULNS:DOC:30259", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30259", "title": "[SECURITY] [DSA 2846-1] libvirt security update", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:ADJACENT_NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-1447", "CVE-2013-6458"], "description": "Few DoS conditions.", "edition": 1, "modified": "2014-01-29T00:00:00", "published": "2014-01-29T00:00:00", "id": "SECURITYVULNS:VULN:13539", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13539", "title": "libvirt security vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:ADJACENT_NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-0223", "CVE-2013-4544", "CVE-2014-2894", "CVE-2013-6456", "CVE-2013-7336", "CVE-2014-0222", "CVE-2013-4541", "CVE-2014-0150", "CVE-2014-3461"], "description": "DoS, memory corruptions, buffer overflow.", "edition": 1, "modified": "2014-05-15T00:00:00", "published": "2014-05-15T00:00:00", "id": "SECURITYVULNS:VULN:13705", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13705", "title": "QEMU multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2019-12-20T18:28:59", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1447", "CVE-2013-6458"], "description": "**CentOS Errata and Security Advisory** CESA-2014:0103\n\n\nThe libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nA use-after-free flaw was found in the way several libvirt block APIs\nhandled domain jobs. A remote attacker able to establish a read-only\nconnection to libvirtd could use this flaw to crash libvirtd or,\npotentially, execute arbitrary code with the privileges of the libvirtd\nprocess (usually root). (CVE-2013-6458)\n\nA race condition was found in the way libvirtd handled keepalive\ninitialization requests when the connection was closed prior to\nestablishing connection credentials. An attacker able to establish a\nread-only connection to libvirtd could use this flaw to crash libvirtd,\nresulting in a denial of service. (CVE-2014-1447)\n\nThis update also fixes the following bug:\n\n* A race condition was possible between a thread starting a virtual machine\nwith a guest agent configured (regular start-up or while migrating) and a\nthread that was killing the VM process (or the process crashing). The race\ncould cause the monitor object to be freed by the thread that killed the VM\nprocess, which was later accessed by the thread that was attempting to\nstart the VM, resulting in a crash. This issue was fixed by checking the\nstate of the VM after the attempted connection to the guest agent; if the\nVM in the meantime exited, no other operations are attempted. (BZ#1055578)\n\nAll libvirt users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, libvirtd will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-January/032163.html\n\n**Affected packages:**\nlibvirt\nlibvirt-client\nlibvirt-devel\nlibvirt-lock-sanlock\nlibvirt-python\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-0103.html", "edition": 3, "modified": "2014-01-29T14:05:41", "published": "2014-01-29T14:05:41", "href": "http://lists.centos.org/pipermail/centos-announce/2014-January/032163.html", "id": "CESA-2014:0103", "title": "libvirt security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:46", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6458", "CVE-2014-1447"], "description": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nA use-after-free flaw was found in the way several libvirt block APIs\nhandled domain jobs. A remote attacker able to establish a read-only\nconnection to libvirtd could use this flaw to crash libvirtd or,\npotentially, execute arbitrary code with the privileges of the libvirtd\nprocess (usually root). (CVE-2013-6458)\n\nA race condition was found in the way libvirtd handled keepalive\ninitialization requests when the connection was closed prior to\nestablishing connection credentials. An attacker able to establish a\nread-only connection to libvirtd could use this flaw to crash libvirtd,\nresulting in a denial of service. (CVE-2014-1447)\n\nThis update also fixes the following bug:\n\n* A race condition was possible between a thread starting a virtual machine\nwith a guest agent configured (regular start-up or while migrating) and a\nthread that was killing the VM process (or the process crashing). The race\ncould cause the monitor object to be freed by the thread that killed the VM\nprocess, which was later accessed by the thread that was attempting to\nstart the VM, resulting in a crash. This issue was fixed by checking the\nstate of the VM after the attempted connection to the guest agent; if the\nVM in the meantime exited, no other operations are attempted. (BZ#1055578)\n\nAll libvirt users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, libvirtd will be restarted automatically.\n", "modified": "2018-06-07T08:59:39", "published": "2014-01-28T05:00:00", "id": "RHSA-2014:0103", "href": "https://access.redhat.com/errata/RHSA-2014:0103", "type": "redhat", "title": "(RHSA-2014:0103) Moderate: libvirt security and bug fix update", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:31", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1447", "CVE-2013-6458"], "description": "[0.10.2-29.0.1.el6_5.3]\n- Replace docs/et.png in tarball with blank image\n[0.10.2-29.el6_5.3]\n- qemu: Avoid operations on NULL monitor if VM fails early (rhbz#1055578)\n- qemu: Do not access stale data in virDomainBlockStats (CVE-2013-6458)\n- qemu: Avoid using stale data in virDomainGetBlockInfo (CVE-2013-6458)\n- qemu: Fix job usage in qemuDomainBlockJobImpl (CVE-2013-6458)\n- qemu: Fix job usage in qemuDomainBlockCopy (rhbz#1054804)\n- qemu: Fix job usage in virDomainGetBlockIoTune (CVE-2013-6458)\n- Don't crash if a connection closes early (CVE-2014-1447)\n- Really don't crash if a connection closes early (CVE-2014-1447)", "edition": 4, "modified": "2014-01-28T00:00:00", "published": "2014-01-28T00:00:00", "id": "ELSA-2014-0103", "href": "http://linux.oracle.com/errata/ELSA-2014-0103.html", "title": "libvirt security and bug fix update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2019-05-30T02:21:31", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1447", "CVE-2013-6458"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2846-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 17, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libvirt\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2013-6458 CVE-2014-1447\n\nMultiple security issues have been found in Libvirt, a virtualisation\nabstraction library:\n\nCVE-2013-6458\n\n It was discovered that insecure job usage could lead to denial of\n service against libvirtd.\n\nCVE-2014-1447\n\n It was discovered that a race condition in keepalive handling could\n lead to denial of service against libvirtd.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 0.9.12.3-1. This bugfix point release also addresses some \nadditional bugfixes.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.2.1-1.\n\nWe recommend that you upgrade your libvirt packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2014-01-17T19:25:57", "published": "2014-01-17T19:25:57", "id": "DEBIAN:DSA-2846-1:FE877", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00015.html", "title": "[SECURITY] [DSA 2846-1] libvirt security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:A/AC:H/Au:N/C:C/I:C/A:C"}}], "f5": [{"lastseen": "2017-10-12T02:11:03", "bulletinFamily": "software", "cvelist": ["CVE-2013-6457", "CVE-2014-7823", "CVE-2013-4399", "CVE-2013-4292", "CVE-2013-6436", "CVE-2013-4400", "CVE-2014-3657", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-5177"], "edition": 1, "description": " \n\n\n * [CVE-2013-4292 \n](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4292>) \nlibvirt 1.1.0 and 1.1.1 allows local users to cause a denial of service (memory consumption) via a large number of domain migrate parameters in certain RPC calls in (1) daemon/remote.c and (2) remote/remote_driver.c.\n * [CVE-2013-4399](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4399>) \n \nThe remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection. \n\n * [CVE-2013-4400](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4400>) \n \nvirt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments. \n\n * [CVE-2013-6436](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6436>) \n \nThe lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the \"virsh memtune\" command. \n\n * [CVE-2013-6457](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6457>) \n \nThe libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command. \n\n * [CVE-2014-0179](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179>) \n \nlibvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods. \n\n * [CVE-2014-3633](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3633>) \n \nThe qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read. \n\n * [CVE-2014-3657](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3657>) \n \nThe virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command. \n\n * [CVE-2014-5177](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5177>) \n \nlibvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors. \n\n * [CVE-2014-7823](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7823>) \n \nThe virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag. \n\n\nImpact \n\n\nNone. F5 products are not affected by these vulnerabilities. \n\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n", "modified": "2016-01-09T02:19:00", "published": "2015-02-13T01:14:00", "id": "F5:K16117", "href": "https://support.f5.com/csp/article/K16117", "title": "Multiple libvirt vulnerabilities", "type": "f5", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-11-09T00:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2013-6457", "CVE-2014-7823", "CVE-2013-4399", "CVE-2013-4292", "CVE-2013-6436", "CVE-2013-4400", "CVE-2014-3657", "CVE-2014-0179", "CVE-2014-3633", "CVE-2014-5177"], "edition": 1, "description": "Recommended Action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2015-02-12T00:00:00", "published": "2015-02-12T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/16000/100/sol16117.html", "id": "SOL16117", "title": "SOL16117 - Multiple libvirt vulnerabilities", "type": "f5", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}