2024-12-12 21:07:30 +00:00

293 lines
13 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181530",
"Version": "oval:org.altlinux.errata:def:20181530",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1530: package `libvirt` update to version 4.2.0-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1530",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1530",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-01492",
"RefURL": "https://bdu.fstec.ru/vul/2018-01492",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00236",
"RefURL": "https://bdu.fstec.ru/vul/2019-00236",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02856",
"RefURL": "https://bdu.fstec.ru/vul/2019-02856",
"Source": "BDU"
},
{
"RefID": "CVE-2018-1064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1064",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5748",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5748",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10132",
"Source": "CVE"
}
],
"Description": "This update upgrades libvirt to version 4.2.0-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2018-01492: Уязвимость библиотеки управления виртуализацией Libvirt, связанной с ошибкой, приводящей к чрезмерному потреблению памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00236: Уязвимость библиотеки управления виртуализацией Libvirt, связанная с ошибкой, приводящей к чрезмерному потреблению памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02856: Уязвимость модулей virtlockd-admin.socket и virtlogd-admin.socket библиотеки управления виртуализацией Libvirt, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2018-1064: libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.\n\n * CVE-2018-5748: qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.\n\n * CVE-2019-10132: A vulnerability was found in libvirt \u003e= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-04-02"
},
"Updated": {
"Date": "2018-04-02"
},
"BDUs": [
{
"ID": "BDU:2018-01492",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-399, CWE-400",
"Href": "https://bdu.fstec.ru/vul/2018-01492",
"Impact": "Low",
"Public": "20180119"
},
{
"ID": "BDU:2019-00236",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-399, CWE-400",
"Href": "https://bdu.fstec.ru/vul/2019-00236",
"Impact": "Low",
"Public": "20180314"
},
{
"ID": "BDU:2019-02856",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-02856",
"Impact": "Low",
"Public": "20190421"
}
],
"CVEs": [
{
"ID": "CVE-2018-1064",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1064",
"Impact": "High",
"Public": "20180328"
},
{
"ID": "CVE-2018-5748",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5748",
"Impact": "High",
"Public": "20180125"
},
{
"ID": "CVE-2019-10132",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10132",
"Impact": "High",
"Public": "20190522"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181530001",
"Comment": "libvirt is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530002",
"Comment": "libvirt-admin is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530003",
"Comment": "libvirt-client is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530004",
"Comment": "libvirt-daemon is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530005",
"Comment": "libvirt-daemon-config-network is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530006",
"Comment": "libvirt-daemon-config-nwfilter is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530007",
"Comment": "libvirt-daemon-driver-interface is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530008",
"Comment": "libvirt-daemon-driver-lxc is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530009",
"Comment": "libvirt-daemon-driver-network is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530010",
"Comment": "libvirt-daemon-driver-nodedev is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530011",
"Comment": "libvirt-daemon-driver-nwfilter is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530012",
"Comment": "libvirt-daemon-driver-qemu is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530013",
"Comment": "libvirt-daemon-driver-secret is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530014",
"Comment": "libvirt-daemon-driver-storage is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530015",
"Comment": "libvirt-daemon-driver-storage-core is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530016",
"Comment": "libvirt-daemon-driver-storage-disk is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530017",
"Comment": "libvirt-daemon-driver-storage-fs is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530018",
"Comment": "libvirt-daemon-driver-storage-gluster is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530019",
"Comment": "libvirt-daemon-driver-storage-iscsi is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530020",
"Comment": "libvirt-daemon-driver-storage-logical is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530021",
"Comment": "libvirt-daemon-driver-storage-mpath is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530022",
"Comment": "libvirt-daemon-driver-storage-rbd is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530023",
"Comment": "libvirt-daemon-driver-storage-scsi is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530024",
"Comment": "libvirt-daemon-driver-storage-zfs is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530025",
"Comment": "libvirt-daemon-driver-vbox is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530026",
"Comment": "libvirt-devel is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530027",
"Comment": "libvirt-docs is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530028",
"Comment": "libvirt-kvm is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530029",
"Comment": "libvirt-libs is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530030",
"Comment": "libvirt-lock-sanlock is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530031",
"Comment": "libvirt-login-shell is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530032",
"Comment": "libvirt-lxc is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530033",
"Comment": "libvirt-qemu is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530034",
"Comment": "libvirt-qemu-common is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530035",
"Comment": "libvirt-vbox is earlier than 0:4.2.0-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181530036",
"Comment": "nss-libvirt is earlier than 0:4.2.0-alt1.S1"
}
]
}
]
}
}
]
}