Lucene search

K

Oracle Linux 8 : virt-manager (ELSA-2019-3464)

Oracle Linux 8: virt-manager vulnerability ELSA-2019-346

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2019-10183
3 Jul 201913:36
cvelist
OSV
RHSA-2019:3464 Red Hat Security Advisory: virt-manager security, bug fix, and enhancement update
16 Sep 202402:39
osv
OSV
OPENSUSE-SU-2024:11500-1 virt-install-3.2.0-10.1 on GA media
15 Jun 202400:00
osv
Oracle linux
virt-manager security, bug fix, and enhancement update
14 Nov 201900:00
oraclelinux
Tenable Nessus
RHEL 8 : virt-manager (RHSA-2019:3464)
6 Nov 201900:00
nessus
Tenable Nessus
CentOS 8 : virt-manager (CESA-2019:3464)
29 Jan 202100:00
nessus
Prion
Design/Logic Flaw
3 Jul 201914:15
prion
CVE
CVE-2019-10183
3 Jul 201914:15
cve
UbuntuCve
CVE-2019-10183
3 Jul 201900:00
ubuntucve
RedhatCVE
CVE-2019-10183
3 Jul 201906:51
redhatcve
Rows per page
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Oracle Linux Security Advisory ELSA-2019-3464.
##

include('compat.inc');

if (description)
{
  script_id(180824);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/11/01");

  script_cve_id("CVE-2019-10183");

  script_name(english:"Oracle Linux 8 : virt-manager (ELSA-2019-3464)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Oracle Linux host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the
ELSA-2019-3464 advisory.

    [2.2.1-2.0.1]
    - Add OL release support to virt-install for OL KVM guest creation [Orabug: 26135782]

    [2.2.1-2]
    - man: virt-install: Fix a couple of launchSecurity related typos (rhbz#1741846)

    [2.2.1-1]
    - Rebased to virt-manager-2.2.1 (rhbz#1726535)
    - The rebase also fixes the following bugs:
        rhbz#1727881, rhbz#1724287, rhbz#1727811
    - spec: add gtksourceview3 dependency introduced by upstream (rhbz#1722820)
    - guest: fix warning message when machine type is changed for secure boot (rhbz#1727811)

    [2.2.0-2]
    - xmleditor: Handle gtksourceview3 as well as gtksourceview4 (rhbz#1722820)
    - xmleditor: Fix the gtksource version checking (rhbz#1722820)
    - spec: add gtksourceview3 dependency introduced by upstream (rhbz#1722820)

    [2.2.0-1]
    - Rebased to virt-manager-2.2.0 (rhbz#1721001)
    - The rebase also fixes the following bugs:
        rhbz#1718065, rhbz#1714304, rhbz#1709857, rhbz#1707379, rhbz#1700354
        rhbz#1692489, rhbz#1690687, rhbz#1690685, rhbz#1683609, rhbz#1679018
        rhbz#1677019, rhbz#1671599, rhbz#1667025, rhbz#1666597, rhbz#1663430
        rhbz#1661867, rhbz#1660467, rhbz#1660123, rhbz#1659354, rhbz#1658511
        rhbz#1648939, rhbz#1599139, rhbz#1508147, rhbz#1501608
    - spec: add build dependencies that are now required for build (rhbz#1721001)

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://linux.oracle.com/errata/ELSA-2019-3464.html");
  script_set_attribute(attribute:"solution", value:
"Update the affected virt-install, virt-manager and / or virt-manager-common packages.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-10183");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/02");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/11/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/09/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:8");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:virt-install");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:virt-manager");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:virt-manager-common");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Oracle Linux Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/local_checks_enabled");

  exit(0);
}


include('rpm.inc');

if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');
var os_release = get_kb_item("Host/RedHat/release");
if (isnull(os_release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:os_release)) audit(AUDIT_OS_NOT, 'Oracle Linux');
var os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');
os_ver = os_ver[1];
if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);

if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);

var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);

var pkgs = [
    {'reference':'virt-install-2.2.1-2.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
    {'reference':'virt-manager-common-2.2.1-2.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
    {'reference':'virt-manager-2.2.1-2.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}
];

var flag = 0;
foreach var package_array ( pkgs ) {
  var reference = NULL;
  var _release = NULL;
  var sp = NULL;
  var _cpu = NULL;
  var el_string = NULL;
  var rpm_spec_vers_cmp = NULL;
  var epoch = NULL;
  var allowmaj = NULL;
  var exists_check = NULL;
  if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
  if (!empty_or_null(package_array['release'])) _release = 'EL' + package_array['release'];
  if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
  if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
  if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
  if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
  if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
  if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
  if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
  if (reference && _release) {
    if (exists_check) {
        if (rpm_exists(release:_release, rpm:exists_check) && rpm_check(release:_release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
    } else {
        if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
    }
  }
}

if (flag)
{
  security_report_v4(
      port       : 0,
      severity   : SECURITY_NOTE,
      extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  var tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'virt-install / virt-manager / virt-manager-common');
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
07 Sep 2023 00:00Current
3.5Low risk
Vulners AI Score3.5
CVSS22.1
CVSS33.2 - 3.3
EPSS0.00067
9
.json
Report