Vulnerabilities > CVE-2018-20533 - NULL Pointer Dereference vulnerability in multiple products

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
opensuse
canonical
CWE-476
nessus

Summary

There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1927.NASL
    descriptionThis update for libzypp and libsolv fixes the following issues : Security issues fixed : - CVE-2018-20532: Fixed NULL pointer dereference at ext/testcase.c (function testcase_read) (bsc#1120629). - CVE-2018-20533: Fixed NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a (bsc#1120630). - CVE-2018-20534: Fixed illegal address access at src/pool.h (function pool_whatprovides) in libsolv.a (bsc#1120631). Fixed bugs and enhancements : - make cleandeps jobs on patterns work (bnc#1137977) - Fixed an issue where libsolv failed to build against swig 4.0 by updating the version to 0.7.5 (bsc#1135749). - Virtualization host upgrade from SLES-15 to SLES-15-SP1 finished with wrong product name shown up (bsc#1131823). - Copy pattern categories from the rpm that defines the pattern (fate#323785). - Enhance scanning /sys for modaliases (bsc#1130161). - Prevent SEGV if the application sets an empty TextLocale (bsc#1127026). - Handle libgpgme error when gpg key is not completely read and user hits CTRL + C (bsc#1127220). - Added a hint when registration codes have expired (bsc#965786). - Adds a better handling of an error when verifying any repository medium (bsc#1065022). - Will now only write type field when probing (bsc#1114908). - Fixes an issue where zypper has showed the info message
    last seen2020-06-01
    modified2020-06-02
    plugin id128013
    published2019-08-20
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128013
    titleopenSUSE Security Update : zypper / libzypp and libsolv (openSUSE-2019-1927)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-1927.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(128013);
      script_version("1.3");
      script_cvs_date("Date: 2020/01/02");
    
      script_cve_id("CVE-2018-20532", "CVE-2018-20533", "CVE-2018-20534");
    
      script_name(english:"openSUSE Security Update : zypper / libzypp and libsolv (openSUSE-2019-1927)");
      script_summary(english:"Check for the openSUSE-2019-1927 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for libzypp and libsolv fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2018-20532: Fixed NULL pointer dereference at
        ext/testcase.c (function testcase_read) (bsc#1120629).
    
      - CVE-2018-20533: Fixed NULL pointer dereference at
        ext/testcase.c (function testcase_str2dep_complex) in
        libsolvext.a (bsc#1120630).
    
      - CVE-2018-20534: Fixed illegal address access at
        src/pool.h (function pool_whatprovides) in libsolv.a
        (bsc#1120631).
    
    Fixed bugs and enhancements :
    
      - make cleandeps jobs on patterns work (bnc#1137977)
    
      - Fixed an issue where libsolv failed to build against
        swig 4.0 by updating the version to 0.7.5 (bsc#1135749). 
    
      - Virtualization host upgrade from SLES-15 to SLES-15-SP1
        finished with wrong product name shown up (bsc#1131823).
    
      - Copy pattern categories from the rpm that defines the
        pattern (fate#323785).
    
      - Enhance scanning /sys for modaliases (bsc#1130161).
    
      - Prevent SEGV if the application sets an empty TextLocale
        (bsc#1127026).
    
      - Handle libgpgme error when gpg key is not completely
        read and user hits CTRL + C (bsc#1127220).
    
      - Added a hint when registration codes have expired
        (bsc#965786).
    
      - Adds a better handling of an error when verifying any
        repository medium (bsc#1065022).
    
      - Will now only write type field when probing
        (bsc#1114908).
    
      - Fixes an issue where zypper has showed the info message
        'Installation aborted by user' while the installation
        was aborted by wicked (bsc#978193).
    
      - Suppresses reporting `/memfd:` pseudo files
        (bsc#1123843).
    
      - Fixes an issue where zypper was not able to install or
        uninstall packages when rpm is unavailable
        (bsc#1122471).
    
      - Fixes an issue where locks were ignored (bsc#1113296).
    
      - Simplify complex locks so zypper can display them
        (bsc#1112911).
    
      - zypper will now set `SYSTEMD_OFFLINE=1` during chrooted
        commits (bsc#1118758).
    
      - no-recommends: Nevertheless consider resolver namespaces
        (hardware, language,..supporting packages)
        (fate#325513).
    
      - Removes world-readable bit from /var/log/zypp
        (bsc#1099019).
    
      - Does no longer fail service-refresh on a empty
        repoindex.xml (bsc#1116840).
    
      - Fixes soname due to libsolv ABI changes (bsc#1115341).
    
      - Add infrastructure to flag specific packages to trigger
        a reboot needed hint (fate#326451).
    
    This update for zypper 1.14.27 fixes the following issues :
    
      - bash-completion: add package completion for addlock
        (bsc#1047962)
    
      - bash-completion: fix incorrect detection of command
        names (bsc#1049826)
    
      - Offer to change the 'runSearchPackages' config option at
        the prompt (bsc#1119373, FATE#325599)
    
      - Prompt: provide a 'yes/no/always/never' prompt.
    
      - Prompt: support '#NUM' as answer to select the NUMth
        option...
    
      - Augeas: enable writing back changed option values (to
        ~/.zypper.conf)
    
      - removelocale: fix segfault
    
      - Move needs-restarting command to subpackage (fixes #254)
    
      - Allow empty string as argument (bsc#1125415)
    
      - Provide a way to delete cache for volatile repositories
        (bsc#1053177)
    
      - Adapt to boost-1.69 requiring explicit casts
        tribool->bool (fixes #255)
    
      - Show support status in info if not unknown (bsc#764147)
    
      - Fix installing plain rpm files with `zypper in`
        (bsc#1124897)
    
      - Show only required info in the summary in quiet mode
        (bsc#993025)
    
      - Stay with legacy behavior and return
        ZYPPER_EXIT_INF_REBOOT_NEEDED only for patches. We don't
        extend this return code to packages, although they may
        also carry the 'reboot-needed' attribute. The preferred
        way to test whether the system needs to be rebooted is
        `zypper needs-rebooting`. (openSUSE/zypper#237)
    
      - Skip repository on error (bsc#1123967)
    
      - New commands for locale management: locales addlocale
        removelocale Inspect and manipulate the systems
        `requested locales`, aka. the languages software
        packages should try support by installing translations,
        dictionaries and tools, as far as they are available.
    
      - Don't throw, just warn if options are repeated
        (bsc#1123865)
    
      - Fix detection whether stdout is a tty (happened too
        late)
    
      - Fix broken --plus-content switch (fixes bsc#1123681)
    
      - Fix broken --replacefiles switch (fixes bsc#1123137)
    
      - Extend zypper source-install (fixes bsc#663358)
    
      - Fix inconsistent results for search (bsc#1119873)
    
      - Show reboot hint in zypper ps and summary (fixes
        bsc#1120263)
    
      - Improve handling of partially locked packages
        (bsc#1113296)
    
      - Fix wrong default values in help text (bsc#1121611)
    
      - Fixed broken argument parsing for --reposd-dir
        (bsc#1122062)
    
      - Fix wrong zypp::indeterminate use (bsc#1120463)
    
      - CLI parser: fix broken initialization enforcing 'select
        by name' (bsc#1119820)
    
      - zypper.conf: [commit] autoAgreeWithLicenses (=false)
        (fixes #220)
    
      - locks: Fix printing of versioned locks (bsc#1112911)
    
      - locks: create and write versioned locks correctly
        (bsc#1112911)
    
      - patch: --with update may implicitly assume
        --with-optional (bsc#1102261)
    
      - no-recommends: Nevertheless consider resolver namespaces
        (hardware, language,..supporting packages) (FATE#325513)
    
      - Optionally run 'zypper search-packages' after 'search'
        (FATE#325599)
    
      - zypper.conf: Add [search]runSearchPackages config
        variable.
    
      - Don't iterate twice on --no-cd (bsc#1111319)
    
      - zypper-log: Make it Python 3 compatible
    
      - man: mention /etc/zypp/needreboot config file
        (fate#326451, fixes #140)
    
      - Add `needs-restarting` shell script and manpage
        (fate#326451)
    
      - Add zypper needs-rebooting command (fate#326451)
    
      - Introduce new zypper command framefork. Migrated
        commands so far: addlock addrepo addservice clean
        cleanlocks modifyrepo modifyservice ps refresh
        refresh-services removelock removerepo removeservice
        renamerepo repos services
    
      - MediaChangeReport: fix https URLs causing 2 prompts on
        error (bsc#1110542)
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1047962"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1049826"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1053177"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1065022"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099019"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102261"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1110542"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1111319"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1112911"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1113296"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1114908"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1115341"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1116840"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1118758"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1119373"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1119820"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1119873"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1120263"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1120463"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1120629"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1120630"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1120631"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1121611"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1122062"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1122471"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1123137"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1123681"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1123843"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1123865"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1123967"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1124897"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1125415"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1127026"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1127155"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1127220"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1130161"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1131823"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1135749"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1137977"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=663358"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=764147"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=965786"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=978193"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=993025"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://features.opensuse.org/323785"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://features.opensuse.org/325513"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://features.opensuse.org/325599"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://features.opensuse.org/326451"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected zypper / libzypp and libsolv packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-backend-zypp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-backend-zypp-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-branding-upstream");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-gstreamer-plugin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-gstreamer-plugin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-gtk3-module");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-gtk3-module-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:PackageKit-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-18-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libpackagekit-glib2-devel-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-demo-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsolv-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-ncurses-pkg-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-ncurses-pkg-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-ncurses-pkg8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-ncurses-pkg8-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-qt-pkg-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-qt-pkg-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-qt-pkg8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libyui-qt-pkg8-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libzypp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libzypp-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libzypp-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libzypp-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl-solv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl-solv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-solv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-solv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-solv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-solv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ruby-solv");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ruby-solv-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-PackageKitGlib-1_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:yast2-pkg-bindings");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:yast2-pkg-bindings-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:yast2-pkg-bindings-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper-aptitude");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper-log");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:zypper-needs-restarting");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/12/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/08/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/20");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-backend-zypp-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-backend-zypp-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-branding-upstream-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-debugsource-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-devel-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-devel-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-gstreamer-plugin-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-gstreamer-plugin-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-gtk3-module-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-gtk3-module-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"PackageKit-lang-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libpackagekit-glib2-18-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libpackagekit-glib2-18-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libpackagekit-glib2-devel-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-ncurses-pkg-debugsource-2.48.5.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-ncurses-pkg-devel-2.48.5.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-ncurses-pkg8-2.48.5.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-ncurses-pkg8-debuginfo-2.48.5.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-qt-pkg-debugsource-2.45.15.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-qt-pkg-devel-2.45.15.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-qt-pkg8-2.45.15.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libyui-qt-pkg8-debuginfo-2.45.15.2-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-PackageKitGlib-1_0-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"yast2-pkg-bindings-4.0.13-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"yast2-pkg-bindings-debuginfo-4.0.13-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"yast2-pkg-bindings-debugsource-4.0.13-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"zypper-aptitude-1.14.28-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"zypper-log-1.14.28-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"zypper-needs-restarting-1.14.28-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libpackagekit-glib2-18-32bit-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libpackagekit-glib2-18-32bit-debuginfo-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libpackagekit-glib2-devel-32bit-1.1.10-lp150.11.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-debugsource-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-demo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-demo-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-devel-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-devel-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-tools-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libsolv-tools-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libzypp-17.12.0-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libzypp-debuginfo-17.12.0-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libzypp-debugsource-17.12.0-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libzypp-devel-17.12.0-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"perl-solv-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"perl-solv-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"python-solv-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"python-solv-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"python3-solv-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"python3-solv-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"ruby-solv-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"ruby-solv-debuginfo-0.7.5-lp150.7.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"zypper-1.14.28-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"zypper-debuginfo-1.14.28-lp150.2.13.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"zypper-debugsource-1.14.28-lp150.2.13.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "PackageKit / PackageKit-backend-zypp / etc");
    }
    
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-1_0-0212_LIBSOLV.NASL
    descriptionAn update of the libsolv package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id122921
    published2019-03-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122921
    titlePhoton OS 1.0: Libsolv PHSA-2019-1.0-0212
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1972-1.NASL
    descriptionThis update for libsolv, libzypp and zypper fixes the following issues : libsolv was updated to version 0.6.36 fixes the following issues : Security issues fixed : CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629). CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630). CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631). Non-security issues fixed: Made cleandeps jobs on patterns work (bsc#1137977). Fixed an issue multiversion packages that obsolete their own name (bsc#1127155). Keep consistent package name if there are multiple alternatives (bsc#1131823). libzypp received following fixes: Fixes a bug where locking the kernel was not possible (bsc#1113296) zypper received following fixes: Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226) Improved the displaying of locks (bsc#1112911) Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542) zypper will now always warn when no repositories are defined (bsc#1109893) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id127090
    published2019-07-26
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127090
    titleSUSE SLED12 / SLES12 Security Update : libsolv, libzypp, zypper (SUSE-SU-2019:1972-1)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3916-1.NASL
    descriptionIt was discovered that libsolv incorrectly handled certain malformed input. If a user or automated system were tricked into opening a specially crafted file, applications that rely on libsolv could be made to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123076
    published2019-03-25
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123076
    titleUbuntu 18.10 : libsolv vulnerabilities (USN-3916-1)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-2_0-0136_LIBSOLV.NASL
    descriptionAn update of the libsolv package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id122913
    published2019-03-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122913
    titlePhoton OS 2.0: Libsolv PHSA-2019-2.0-0136
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2033.NASL
    descriptionAccording to the versions of the libsolv package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20533) - There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20532) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-09-24
    plugin id129226
    published2019-09-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129226
    titleEulerOS 2.0 SP3 : libsolv (EulerOS-SA-2019-2033)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1910.NASL
    descriptionAccording to the versions of the libsolv package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20533) - There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20532) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-09-16
    plugin id128833
    published2019-09-16
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128833
    titleEulerOS 2.0 SP5 : libsolv (EulerOS-SA-2019-1910)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1374.NASL
    descriptionThere is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.(CVE-2018-20534) There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20532) There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20533)
    last seen2020-06-01
    modified2020-06-02
    plugin id132262
    published2019-12-19
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132262
    titleAmazon Linux 2 : libsolv (ALAS-2019-1374)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190806_LIBSOLV_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) - libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) - libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534)
    last seen2020-03-18
    modified2019-08-27
    plugin id128234
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128234
    titleScientific Linux Security Update : libsolv on SL7.x x86_64 (20190806)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1652.NASL
    descriptionAccording to the versions of the libsolv package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.(CVE-2018-20534) - There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20533) - There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20532) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-06-27
    plugin id126279
    published2019-06-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126279
    titleEulerOS 2.0 SP8 : libsolv (EulerOS-SA-2019-1652)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2265-1.NASL
    descriptionThis update for libsolv, libzypp and zypper fixes the following issues : libsolv was updated to version 0.6.36 and fixes the following issues : Security issues fixed : CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629). CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630). CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631). Non-security issues fixed: Made cleandeps jobs on patterns work (bsc#1137977). Fixed an issue multiversion packages that obsolete their own name (bsc#1127155). Keep consistent package name if there are multiple alternatives (bsc#1131823). Fixes for libzypp: Fixes a bug where locking the kernel was not possible (bsc#1113296) Fixes a file descriptor leak (bsc#1116995) Will now run file conflict check on dry-run (best with download-only) (bsc#1140039) Fixes for zypper: Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226) Improved the displaying of locks (bsc#1112911) Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542) zypper will now always warn when no repositories are defined (bsc#1109893) Fixes bash completion option detection (bsc#1049825) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id128472
    published2019-09-03
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128472
    titleSUSE SLED12 / SLES12 Security Update : libsolv, libzypp, zypper (SUSE-SU-2019:2265-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2030-1.NASL
    descriptionThis update for libzypp and libsolv fixes the following issues : Security issues fixed : CVE-2018-20532: Fixed NULL pointer dereference at ext/testcase.c (function testcase_read) (bsc#1120629). CVE-2018-20533: Fixed NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a (bsc#1120630). CVE-2018-20534: Fixed illegal address access at src/pool.h (function pool_whatprovides) in libsolv.a (bsc#1120631). Fixed bugs and enhancements: make cleandeps jobs on patterns work (bnc#1137977) Fixed an issue where libsolv failed to build against swig 4.0 by updating the version to 0.7.5 (bsc#1135749). Virtualization host upgrade from SLES-15 to SLES-15-SP1 finished with wrong product name shown up (bsc#1131823). Copy pattern categories from the rpm that defines the pattern (fate#323785). Enhance scanning /sys for modaliases (bsc#1130161). Prevent SEGV if the application sets an empty TextLocale (bsc#1127026). Handle libgpgme error when gpg key is not completely read and user hits CTRL + C (bsc#1127220). Added a hint when registration codes have expired (bsc#965786). Adds a better handling of an error when verifying any repository medium (bsc#1065022). Will now only write type field when probing (bsc#1114908). Fixes an issue where zypper has showed the info message
    last seen2020-06-01
    modified2020-06-02
    plugin id127759
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127759
    titleSUSE SLED15 / SLES15 Security Update : zypper, libzypp / libsolv (SUSE-SU-2019:2030-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-2290.NASL
    descriptionAn update for libsolv is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Security Fix(es) : * libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) * libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) * libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id128385
    published2019-08-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128385
    titleCentOS 7 : libsolv (CESA-2019:2290)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2290.NASL
    descriptionAn update for libsolv is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Security Fix(es) : * libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) * libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) * libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id127707
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127707
    titleRHEL 7 : libsolv (RHSA-2019:2290)

Redhat

advisories
rhsa
idRHSA-2019:2290
rpms
  • libsolv-0:0.6.34-4.el7
  • libsolv-debuginfo-0:0.6.34-4.el7
  • libsolv-demo-0:0.6.34-4.el7
  • libsolv-devel-0:0.6.34-4.el7
  • libsolv-tools-0:0.6.34-4.el7
  • python2-solv-0:0.6.34-4.el7