Vulnerabilities > CVE-2019-10167 - Path Traversal vulnerability in Redhat products

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
redhat
CWE-22
nessus

Summary

The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Relative Path Traversal
    An attacker exploits a weakness in input validation on the target by supplying a specially constructed path utilizing dot and slash characters for the purpose of obtaining access to arbitrary files or resources. An attacker modifies a known path on the target in order to reach material that is not available through intended channels. These attacks normally involve adding additional path separators (/ or \) and/or dots (.), or encodings thereof, in various combinations in order to reach parent directories or entirely separate trees of the target's directory structure.
  • Directory Traversal
    An attacker with access to file system resources, either directly or via application logic, will use various file path specification or navigation mechanisms such as ".." in path strings and absolute paths to extend their range of access to inappropriate areas of the file system. The attacker attempts to either explore the file system for recon purposes or access directories and files that are intended to be restricted from their access. Exploring the file system can be achieved through constructing paths presented to directory listing programs, such as "ls" and 'dir', or through specially crafted programs that attempt to explore the file system. The attacker engaging in this type of activity is searching for information that can be used later in a more exploitive attack. Access to restricted directories or files can be achieved through modification of path references utilized by system applications.
  • File System Function Injection, Content Based
    An attack of this type exploits the host's trust in executing remote content including binary files. The files are poisoned with a malicious payload (targeting the file systems accessible by the target software) by the attacker and may be passed through standard channels such as via email, and standard web content like PDF and multimedia files. The attacker exploits known vulnerabilities or handling routines in the target processes. Vulnerabilities of this type have been found in a wide variety of commercial applications from Microsoft Office to Adobe Acrobat and Apple Safari web browser. When the attacker knows the standard handling routines and can identify vulnerabilities and entry points they can be exploited by otherwise seemingly normal content. Once the attack is executed, the attackers' program can access relative directories such as C:\Program Files or other standard system directories to launch further attacks. In a worst case scenario, these programs are combined with other propagation logic and work as a virus.
  • Using Slashes and URL Encoding Combined to Bypass Validation Logic
    This attack targets the encoding of the URL combined with the encoding of the slash characters. An attacker can take advantage of the multiple way of encoding an URL and abuse the interpretation of the URL. An URL may contain special character that need special syntax handling in order to be interpreted. Special characters are represented using a percentage character followed by two digits representing the octet code of the original character (%HEX-CODE). For instance US-ASCII space character would be represented with %20. This is often referred as escaped ending or percent-encoding. Since the server decodes the URL from the requests, it may restrict the access to some URL paths by validating and filtering out the URL requests it received. An attacker will try to craft an URL with a sequence of special characters which once interpreted by the server will be equivalent to a forbidden URL. It can be difficult to protect against this attack since the URL can contain other format of encoding such as UTF-8 encoding, Unicode-encoding, etc.
  • Manipulating Input to File System Calls
    An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1686-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which could have been used to execute arbitrary emulators (bsc#1138303). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126237
    published2019-06-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126237
    titleSUSE SLES12 Security Update : libvirt (SUSE-SU-2019:1686-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2019:1686-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126237);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/10");
    
      script_cve_id("CVE-2019-10161", "CVE-2019-10167");
    
      script_name(english:"SUSE SLES12 Security Update : libvirt (SUSE-SU-2019:1686-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for libvirt fixes the following issues :
    
    Security issues fixed :
    
    CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could
    accept a path parameter pointing anywhere on the system and
    potentially leading to execution of a malicious file with root
    privileges by libvirtd (bsc#1138301).
    
    CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities
    API which could have been used to execute arbitrary emulators
    (bsc#1138303).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1138301"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1138303"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-10161/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-10167/"
      );
      # https://www.suse.com/support/update/announcement/2019/suse-su-20191686-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ce05d41a"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch
    SUSE-SLE-SAP-12-SP1-2019-1686=1
    
    SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch
    SUSE-SLE-SERVER-12-SP1-2019-1686=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-client-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-config-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-config-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-interface");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-interface-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-libxl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-libxl-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-lxc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-lxc-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-network-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nodedev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nodedev-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-nwfilter-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-qemu");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-qemu-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-secret");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-secret-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-driver-storage-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-lxc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-qemu");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-daemon-xen");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-lock-sanlock");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libvirt-lock-sanlock-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/30");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/06/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/06/25");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP1", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"libvirt-daemon-driver-libxl-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"libvirt-daemon-driver-libxl-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"libvirt-daemon-xen-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-client-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-client-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-config-network-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-config-nwfilter-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-interface-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-interface-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-lxc-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-lxc-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-network-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-network-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-nodedev-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-nodedev-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-nwfilter-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-nwfilter-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-qemu-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-qemu-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-secret-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-secret-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-storage-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-driver-storage-debuginfo-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-lxc-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-daemon-qemu-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-debugsource-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-doc-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-lock-sanlock-1.2.18.4-22.13.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"1", reference:"libvirt-lock-sanlock-debuginfo-1.2.18.4-22.13.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvirt");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1672.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : - CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). - CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have been used to alter the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126372
    published2019-07-01
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126372
    titleopenSUSE Security Update : libvirt (openSUSE-2019-1672)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-1672.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126372);
      script_version("1.3");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-10161", "CVE-2019-10166", "CVE-2019-10167");
    
      script_name(english:"openSUSE Security Update : libvirt (openSUSE-2019-1672)");
      script_summary(english:"Check for the openSUSE-2019-1672 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for libvirt fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API
        which could accept a path parameter pointing anywhere on
        the system and potentially leading to execution of a
        malicious file with root privileges by libvirtd
        (bsc#1138301).
    
      - CVE-2019-10166: Fixed an issue with
        virDomainManagedSaveDefineXML which could have been used
        to alter the domain's config used for managedsave or
        execute arbitrary emulator binaries (bsc#1138302).
    
      - CVE-2019-10167: Fixed an issue with
        virConnectGetDomainCapabilities API which could have
        been used to execute arbitrary emulators (bsc#1138303).
    
    Other issue addressed :
    
      - spec: add systemd-container dependency to qemu and lxc
        drivers (bsc#1136109).
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1136109"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1138301"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1138302"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1138303"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libvirt packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-admin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-admin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-client-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-client-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-config-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-config-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-interface-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-libxl-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-lxc-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-network-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nodedev-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-nwfilter-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-qemu-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-secret-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-core-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-disk-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-iscsi-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-logical-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-mpath-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-storage-scsi-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-uml-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-driver-vbox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-hooks");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-lxc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-qemu");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-uml");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-vbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-daemon-xen");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-devel-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-libs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-lock-sanlock-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-nss");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libvirt-nss-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:wireshark-plugin-libvirt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:wireshark-plugin-libvirt-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/30");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/06/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-admin-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-admin-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-client-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-client-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-config-network-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-config-nwfilter-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-interface-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-lxc-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-network-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-nodedev-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-qemu-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-secret-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-core-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-uml-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-vbox-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-hooks-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-lxc-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-qemu-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-uml-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-daemon-vbox-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-debugsource-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-devel-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-libs-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-libs-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-lock-sanlock-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-nss-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libvirt-nss-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"wireshark-plugin-libvirt-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-client-32bit-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-daemon-driver-libxl-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-daemon-driver-libxl-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-daemon-driver-storage-rbd-debuginfo-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-daemon-xen-4.0.0-lp150.7.18.2") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libvirt-devel-32bit-4.0.0-lp150.7.18.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvirt / libvirt-admin / libvirt-admin-debuginfo / libvirt-client / etc");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4047-1.NASL
    descriptionMatthias Gerstner and Jan Tomko discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to check for arbitrary files, or execute arbitrary binaries. In the default installation, attackers would be isolated by the libvirt AppArmor profile. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126563
    published2019-07-09
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126563
    titleUbuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : libvirt vulnerabilities (USN-4047-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-4047-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126563);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2019-10161", "CVE-2019-10166", "CVE-2019-10167", "CVE-2019-10168");
      script_xref(name:"USN", value:"4047-1");
    
      script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : libvirt vulnerabilities (USN-4047-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Matthias Gerstner and Jan Tomko discovered that libvirt incorrectly
    handled certain API calls. An attacker could possibly use this issue
    to check for arbitrary files, or execute arbitrary binaries. In the
    default installation, attackers would be isolated by the libvirt
    AppArmor profile.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/4047-1/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libvirt-bin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libvirt-clients");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libvirt-daemon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libvirt0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:19.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/30");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/09");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(16\.04|18\.04|18\.10|19\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 18.04 / 18.10 / 19.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"16.04", pkgname:"libvirt-bin", pkgver:"1.3.1-1ubuntu10.27")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"libvirt0", pkgver:"1.3.1-1ubuntu10.27")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"libvirt-clients", pkgver:"4.0.0-1ubuntu8.12")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"libvirt-daemon", pkgver:"4.0.0-1ubuntu8.12")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"libvirt0", pkgver:"4.0.0-1ubuntu8.12")) flag++;
    if (ubuntu_check(osver:"18.10", pkgname:"libvirt-clients", pkgver:"4.6.0-2ubuntu3.8")) flag++;
    if (ubuntu_check(osver:"18.10", pkgname:"libvirt-daemon", pkgver:"4.6.0-2ubuntu3.8")) flag++;
    if (ubuntu_check(osver:"18.10", pkgname:"libvirt0", pkgver:"4.6.0-2ubuntu3.8")) flag++;
    if (ubuntu_check(osver:"19.04", pkgname:"libvirt-clients", pkgver:"5.0.0-1ubuntu2.4")) flag++;
    if (ubuntu_check(osver:"19.04", pkgname:"libvirt-daemon", pkgver:"5.0.0-1ubuntu2.4")) flag++;
    if (ubuntu_check(osver:"19.04", pkgname:"libvirt0", pkgver:"5.0.0-1ubuntu2.4")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvirt-bin / libvirt-clients / libvirt-daemon / libvirt0");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1724.NASL
    descriptionAccording to the versions of the libvirt packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) - libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function(CVE-2019-3840) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-07-22
    plugin id126852
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126852
    titleEulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-1724)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(126852);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/04");
    
      script_cve_id(
        "CVE-2019-10161",
        "CVE-2019-10167",
        "CVE-2019-3840"
      );
    
      script_name(english:"EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-1724)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the libvirt packages installed, the
    EulerOS installation on the remote host is affected by the following
    vulnerabilities :
    
      - libvirt: arbitrary file read/exec via
        virDomainSaveImageGetXMLDesc API (CVE-2019-10161)
    
      - libvirt: arbitrary command execution via
        virConnectGetDomainCapabilities API (CVE-2019-10167)
    
      - libvirt: NULL pointer dereference after running
        qemuAgentCommand in qemuAgentGetInterfaces
        function(CVE-2019-3840)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1724
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d1920901");
      script_set_attribute(attribute:"solution", value:
    "Update the affected libvirt packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/22");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-config-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-config-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-interface");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-lxc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nodedev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nwfilter");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-qemu");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-secret");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-kvm");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["libvirt-2.0.0-10.10.h3",
            "libvirt-client-2.0.0-10.10.h3",
            "libvirt-daemon-2.0.0-10.10.h3",
            "libvirt-daemon-config-network-2.0.0-10.10.h3",
            "libvirt-daemon-config-nwfilter-2.0.0-10.10.h3",
            "libvirt-daemon-driver-interface-2.0.0-10.10.h3",
            "libvirt-daemon-driver-lxc-2.0.0-10.10.h3",
            "libvirt-daemon-driver-network-2.0.0-10.10.h3",
            "libvirt-daemon-driver-nodedev-2.0.0-10.10.h3",
            "libvirt-daemon-driver-nwfilter-2.0.0-10.10.h3",
            "libvirt-daemon-driver-qemu-2.0.0-10.10.h3",
            "libvirt-daemon-driver-secret-2.0.0-10.10.h3",
            "libvirt-daemon-driver-storage-2.0.0-10.10.h3",
            "libvirt-daemon-kvm-2.0.0-10.10.h3"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvirt");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-4714.NASL
    descriptionDescription of changes: [5.0.0-9.el7] - qemu: remove cpuhostmask and cpuguestmask from virCaps structure (Wim ten Have) [Orabug: 29956508] [5.0.0-8.el7] - api: disallow virDomainSaveImageGetXMLDesc on read-only connections (J&aacute n Tomko) [Orabug: 29955742] {CVE-2019-10161} - domain: Define explicit flags for saved image xml (Eric Blake) [Orabug: 29955742] - api: disallow virDomainManagedSaveDefineXML on read-only connections (J&aacute n Tomko) [Orabug: 29955742] {CVE-2019-10166} - api: disallow virConnectGetDomainCapabilities on read-only connections (J&aacute n Tomko) [Orabug: 29955742] {CVE-2019-10167} - api: disallow virConnect*HypervisorCPU on read-only connections (J&aacute n Tomko) [Orabug: 29955742] {CVE-2019-10168} [5.0.0-7.el7] - cpu_map: Define md-clear CPUID bit (Jiri Denemark) [Orabug: 29874181] {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130} {CVE-2019-11091} [5.0.0-6.el7] - qemu: Driver change adding private lock to auto-tune hugepages (Wim ten Have) [Orabug: 29809943] [5.0.0-5.el7] - qemu: disable setmem change requests for vNUMA targets (Wim ten Have) [Orabug: 29797366] - domain: Disable memballoon memory configuration support for vNUMA guests (Wim ten Have) [Orabug: 29797366] - qemu: Driver change to target for vNUMA setmaxmem change request (Wim ten Have) [Orabug: 29749852] - domain: Add domain memory config support for vNUMA guests (Wim ten Have) [Orabug: 29749852] - logging: restrict sockets to mode 0600 (Daniel P. Berrang&eacute ) [Orabug: 29861433] {CVE-2019-10132} - locking: restrict sockets to mode 0600 (Daniel P. Berrang&eacute ) [Orabug: 29861433] {CVE-2019-10132} - admin: reject clients unless their UID matches the current UID (Daniel P. Berrang&eacute ) [Orabug: 29861433] {CVE-2019-10132}
    last seen2020-06-01
    modified2020-06-02
    plugin id126674
    published2019-07-15
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126674
    titleOracle Linux 7 : libvirt (ELSA-2019-4714) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1274.NASL
    descriptionUncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091) Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the
    last seen2020-06-01
    modified2020-06-02
    plugin id128288
    published2019-08-28
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128288
    titleAmazon Linux 2 : libvirt (ALAS-2019-1274) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1637-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have been used to alter the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126165
    published2019-06-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126165
    titleSUSE SLED15 / SLES15 Security Update : libvirt (SUSE-SU-2019:1637-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1643-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have been used to alter the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126166
    published2019-06-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126166
    titleSUSE SLED15 / SLES15 Security Update : libvirt (SUSE-SU-2019:1643-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1832.NASL
    descriptionTwo vulnerabilities were discovered in libvirt, an abstraction API for different underlying virtualisation mechanisms provided by the kernel, etc. - CVE-2019-10161: Prevent an vulnerability where readonly clients could use the API to specify an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause a denial of service or otherwise cause libvirtd to execute arbitrary programs. - CVE-2019-10167: Prevent an arbitrary code execution vulnerability via the API where a user-specified binary used to probe the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126220
    published2019-06-25
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126220
    titleDebian DLA-1832-1 : libvirt security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-9210998AAA.NASL
    description - CVE-2019-10161: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (bz #1722463, bz #1720115) - CVE-2019-10166: virDomainManagedSaveDefineXML API exposed to readonly clients (bz #1722462, bz #1720114) - CVE-2019-10167: arbitrary command execution via virConnectGetDomainCapabilities API (bz #1722464, bz #1720117) - CVE-2019-10168: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (bz #1722466, bz #1720118) - CVE-2019-3886: virsh domhostname command discloses guest hostname in readonly mode [fedora-rawhide - Failed to attache NEW rbd device to guest (bz #1672620) - PCI hostdev interface segfault (bz #1692053) ---- Fix systemd socket permissions (CVE-2019-10132) The virtlockd-admin.socket, virtlogd-admin.sock, virtlockd.socket & virtlogd.socket units must be restarted, if currently running. This can be done with a host reboot or systemctl commands. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126531
    published2019-07-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126531
    titleFedora 29 : libvirt (2019-9210998aaa)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190620_LIBVIRT_ON_SL6_X.NASL
    descriptionSecurity Fix(es) : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) - libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)
    last seen2020-03-18
    modified2019-06-21
    plugin id126090
    published2019-06-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126090
    titleScientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20190620)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2105-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which could have been used to execute arbitrary emulators (bsc#1138303). Non-security issue fixed: qemu: Add support for overriding max threads per process limit (bsc#1133719) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id127789
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127789
    titleSUSE SLES12 Security Update : libvirt (SUSE-SU-2019:2105-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190620_LIBVIRT_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) - libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) Bug Fix(es) : - Live migration fail with unsafe error when GPFS is used as shared filesystem
    last seen2020-03-18
    modified2019-06-21
    plugin id126091
    published2019-06-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126091
    titleScientific Linux Security Update : libvirt on SL7.x x86_64 (20190620)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2227-2.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which could have been used to execute arbitrary emulators (bsc#1138303). Non-security issues fixed: Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734). Added support for overriding max threads per process limit (bsc#1133719) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id128752
    published2019-09-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128752
    titleSUSE SLES12 Security Update : libvirt (SUSE-SU-2019:2227-2)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1762.NASL
    descriptionAn update for the virt:8.0.0 module is now available for Red Hat Enterprise Linux 8 Advanced Virtualization. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix(es) : * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-05-23
    modified2019-07-15
    plugin id126679
    published2019-07-15
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126679
    titleRHEL 8 : Virtualization Manager (RHSA-2019:1762)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1599-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have been used to alter the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126154
    published2019-06-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126154
    titleSUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2019:1599-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-1579.NASL
    descriptionAn update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es) : * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Live migration fail with unsafe error when GPFS is used as shared filesystem (BZ#1715867)
    last seen2020-06-01
    modified2020-06-02
    plugin id126076
    published2019-06-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126076
    titleCentOS 7 : libvirt (CESA-2019:1579)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1579.NASL
    descriptionFrom Red Hat Security Advisory 2019:1579 : An update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es) : * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Live migration fail with unsafe error when GPFS is used as shared filesystem (BZ#1715867)
    last seen2020-06-01
    modified2020-06-02
    plugin id126141
    published2019-06-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126141
    titleOracle Linux 7 : libvirt (ELSA-2019-1579)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2227-1.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed : CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which could have been used to execute arbitrary emulators (bsc#1138303). Non-security issues fixed: Fixed an issue with short bitmaps when setting vcpu affinity using the vcpupin (bsc#1138734). Added support for overriding max threads per process limit (bsc#1133719) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id128312
    published2019-08-29
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128312
    titleSUSE SLES12 Security Update : libvirt (SUSE-SU-2019:2227-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4469.NASL
    descriptionTwo vulnerabilities were discovered in Libvirt, a virtualisation abstraction library, allowing an API client with read-only permissions to execute arbitrary commands via the virConnectGetDomainCapabilities API, or read or execute arbitrary files via the virDomainSaveImageGetXMLDesc API. Additionally the libvirt
    last seen2020-06-01
    modified2020-06-02
    plugin id126128
    published2019-06-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126128
    titleDebian DSA-4469-1 : libvirt - security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1580.NASL
    descriptionAn update for the virt:rhel module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es) : * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-05-23
    modified2019-06-21
    plugin id126088
    published2019-06-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126088
    titleRHEL 8 : virt:rhel (RHSA-2019:1580)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1699.NASL
    descriptionAn update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host
    last seen2020-06-01
    modified2020-06-02
    plugin id126559
    published2019-07-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126559
    titleRHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1774.NASL
    descriptionAccording to the versions of the libvirt packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) - libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-07-25
    plugin id127011
    published2019-07-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127011
    titleEulerOS 2.0 SP8 : libvirt (EulerOS-SA-2019-1774)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2019-3_0-0032_LIBVIRT.NASL
    descriptionAn update of the libvirt package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id130112
    published2019-10-22
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130112
    titlePhoton OS 3.0: Libvirt PHSA-2019-3.0-0032
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1957.NASL
    descriptionAccording to the versions of the libvirt packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs. (CVE-2019-10161) - The virConnectGetDomainCapabilities() libvirt API accepts an
    last seen2020-06-01
    modified2020-06-02
    plugin id128960
    published2019-09-17
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128960
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : libvirt (EulerOS-SA-2019-1957)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1753.NASL
    descriptionThis update for libvirt fixes the following issues : Security issues fixed: &#9; - CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path parameter pointing anywhere on the system and potentially leading to execution of a malicious file with root privileges by libvirtd (bsc#1138301). - CVE-2019-10166: Fixed an issue with virDomainManagedSaveDefineXML which could have been used to alter the domain
    last seen2020-06-01
    modified2020-06-02
    plugin id126894
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126894
    titleopenSUSE Security Update : libvirt (openSUSE-2019-1753)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1579.NASL
    descriptionAn update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es) : * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Live migration fail with unsafe error when GPFS is used as shared filesystem (BZ#1715867)
    last seen2020-06-01
    modified2020-06-02
    plugin id126087
    published2019-06-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126087
    titleRHEL 7 : libvirt (RHSA-2019:1579)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2020.NASL
    descriptionAccording to the versions of the libvirt packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) - libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function(CVE-2019-3840) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-09-24
    plugin id129213
    published2019-09-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129213
    titleEulerOS 2.0 SP3 : libvirt (EulerOS-SA-2019-2020)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-202003-18.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-202003-18 (libvirt: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details. Impact : A local privileged attacker could execute arbitrary commands, escalate privileges or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-03-19
    modified2020-03-16
    plugin id134595
    published2020-03-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134595
    titleGLSA-202003-18 : libvirt: Multiple vulnerabilities
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-1_0-0276_LIBVIRT.NASL
    descriptionAn update of the libvirt package has been released.
    last seen2020-03-17
    modified2020-02-13
    plugin id133683
    published2020-02-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133683
    titlePhoton OS 1.0: Libvirt PHSA-2020-1.0-0276
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-2_0-0214_LIBVIRT.NASL
    descriptionAn update of the libvirt package has been released.
    last seen2020-03-17
    modified2020-03-11
    plugin id134427
    published2020-03-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134427
    titlePhoton OS 2.0: Libvirt PHSA-2020-2.0-0214
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1796.NASL
    descriptionAccording to the versions of the libvirt packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) - libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) - libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-08-23
    plugin id128088
    published2019-08-23
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128088
    titleEulerOS 2.0 SP5 : libvirt (EulerOS-SA-2019-1796)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-B2DFB13DAF.NASL
    description - CVE-2019-10161: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (bz #1722463, bz #1720115) - CVE-2019-10166: virDomainManagedSaveDefineXML API exposed to readonly clients (bz #1722462, bz #1720114) - CVE-2019-10167: arbitrary command execution via virConnectGetDomainCapabilities API (bz #1722464, bz #1720117) - CVE-2019-10168: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (bz #1722466, bz #1720118) - CVE-2019-3886: virsh domhostname command discloses guest hostname in readonly mode [fedora-rawhide - Cannot start VM with a CBR 2.0 TPM device (bz #1712556) - libvirtd does not update VM .xml configurations after virsh snapshot/blockcommit (bz #1722348) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126532
    published2019-07-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126532
    titleFedora 30 : libvirt (2019-b2dfb13daf)

Redhat

rpms
  • libvirt-0:4.5.0-10.el7_6.12
  • libvirt-admin-0:4.5.0-10.el7_6.12
  • libvirt-bash-completion-0:4.5.0-10.el7_6.12
  • libvirt-client-0:4.5.0-10.el7_6.12
  • libvirt-daemon-0:4.5.0-10.el7_6.12
  • libvirt-daemon-config-network-0:4.5.0-10.el7_6.12
  • libvirt-daemon-config-nwfilter-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-interface-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-lxc-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-network-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-nodedev-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-nwfilter-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-qemu-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-secret-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-core-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-disk-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-gluster-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-iscsi-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-logical-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-mpath-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-rbd-0:4.5.0-10.el7_6.12
  • libvirt-daemon-driver-storage-scsi-0:4.5.0-10.el7_6.12
  • libvirt-daemon-kvm-0:4.5.0-10.el7_6.12
  • libvirt-daemon-lxc-0:4.5.0-10.el7_6.12
  • libvirt-debuginfo-0:4.5.0-10.el7_6.12
  • libvirt-devel-0:4.5.0-10.el7_6.12
  • libvirt-docs-0:4.5.0-10.el7_6.12
  • libvirt-libs-0:4.5.0-10.el7_6.12
  • libvirt-lock-sanlock-0:4.5.0-10.el7_6.12
  • libvirt-login-shell-0:4.5.0-10.el7_6.12
  • libvirt-nss-0:4.5.0-10.el7_6.12
  • SLOF-0:20171214-5.gitfa98132.module+el8.0.0.z+3418+a72cf898
  • hivex-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • hivex-debugsource-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • hivex-devel-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • libguestfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-bash-completion-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-benchmarking-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-benchmarking-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-debugsource-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-devel-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-gfs2-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-gobject-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-gobject-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-gobject-devel-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-inspect-icons-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-java-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-java-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-java-devel-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-javadoc-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-man-pages-ja-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-man-pages-uk-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-rescue-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-rsync-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-tools-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-tools-c-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-tools-c-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libguestfs-winsupport-0:8.0-2.module+el8.0.0.z+3418+a72cf898
  • libguestfs-xfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • libiscsi-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libiscsi-debuginfo-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libiscsi-debugsource-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libiscsi-devel-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libiscsi-utils-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libiscsi-utils-debuginfo-0:1.18.0-6.module+el8.0.0.z+3418+a72cf898
  • libssh2-0:1.8.0-7.module+el8.0.0.z+3418+a72cf898.1
  • libssh2-debuginfo-0:1.8.0-7.module+el8.0.0.z+3418+a72cf898.1
  • libssh2-debugsource-0:1.8.0-7.module+el8.0.0.z+3418+a72cf898.1
  • libvirt-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-admin-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-admin-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-bash-completion-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-client-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-client-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-config-network-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-config-nwfilter-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-interface-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-interface-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-network-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-network-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-nodedev-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-nodedev-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-nwfilter-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-nwfilter-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-qemu-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-qemu-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-secret-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-secret-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-core-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-core-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-disk-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-disk-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-gluster-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-gluster-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-iscsi-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-iscsi-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-logical-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-logical-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-mpath-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-mpath-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-rbd-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-rbd-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-scsi-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-driver-storage-scsi-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-daemon-kvm-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-dbus-0:1.2.0-2.module+el8.0.0.z+3418+a72cf898
  • libvirt-dbus-debuginfo-0:1.2.0-2.module+el8.0.0.z+3418+a72cf898
  • libvirt-dbus-debugsource-0:1.2.0-2.module+el8.0.0.z+3418+a72cf898
  • libvirt-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-debugsource-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-devel-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-docs-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-libs-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-libs-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-lock-sanlock-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-lock-sanlock-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-nss-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-nss-debuginfo-0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • libvirt-python-debugsource-0:4.5.0-1.module+el8.0.0.z+3418+a72cf898
  • lua-guestfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • lua-guestfs-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • nbdkit-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-bash-completion-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-basic-plugins-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-basic-plugins-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-debugsource-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-devel-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-example-plugins-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-example-plugins-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-gzip-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-gzip-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-python-common-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-python3-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-python3-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-vddk-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-vddk-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-xz-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • nbdkit-plugin-xz-debuginfo-0:1.4.2-4.module+el8.0.0.z+3418+a72cf898
  • netcf-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • netcf-debuginfo-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • netcf-debugsource-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • netcf-devel-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • netcf-libs-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • netcf-libs-debuginfo-0:0.2.8-10.module+el8.0.0.z+3418+a72cf898
  • perl-Sys-Guestfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • perl-Sys-Guestfs-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • perl-Sys-Virt-0:4.5.0-4.module+el8.0.0.z+3418+a72cf898
  • perl-Sys-Virt-debuginfo-0:4.5.0-4.module+el8.0.0.z+3418+a72cf898
  • perl-Sys-Virt-debugsource-0:4.5.0-4.module+el8.0.0.z+3418+a72cf898
  • perl-hivex-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • perl-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • python3-hivex-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • python3-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • python3-libguestfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • python3-libguestfs-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • python3-libvirt-0:4.5.0-1.module+el8.0.0.z+3418+a72cf898
  • python3-libvirt-debuginfo-0:4.5.0-1.module+el8.0.0.z+3418+a72cf898
  • qemu-guest-agent-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-guest-agent-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-img-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-img-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-curl-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-curl-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-gluster-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-gluster-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-iscsi-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-iscsi-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-rbd-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-rbd-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-ssh-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-block-ssh-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-common-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-common-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-core-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-core-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-debuginfo-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • qemu-kvm-debugsource-15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • ruby-hivex-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • ruby-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3418+a72cf898
  • ruby-libguestfs-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • ruby-libguestfs-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • seabios-0:1.11.1-3.module+el8.0.0.z+3418+a72cf898
  • seabios-bin-0:1.11.1-3.module+el8.0.0.z+3418+a72cf898
  • seavgabios-bin-0:1.11.1-3.module+el8.0.0.z+3418+a72cf898
  • sgabios-1:0.20170427git-2.module+el8.0.0.z+3418+a72cf898
  • sgabios-bin-1:0.20170427git-2.module+el8.0.0.z+3418+a72cf898
  • supermin-0:5.1.19-8.module+el8.0.0.z+3418+a72cf898
  • supermin-debuginfo-0:5.1.19-8.module+el8.0.0.z+3418+a72cf898
  • supermin-debugsource-0:5.1.19-8.module+el8.0.0.z+3418+a72cf898
  • supermin-devel-0:5.1.19-8.module+el8.0.0.z+3418+a72cf898
  • virt-dib-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • virt-dib-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • virt-p2v-maker-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • virt-v2v-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • virt-v2v-debuginfo-1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898
  • redhat-release-virtualization-host-0:4.3.4-1.el7ev
  • redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6
  • redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev
  • SLOF-0:20180702-3.git9b7ab2f.module+el8.0.0.z+3438+2851622e
  • hivex-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • hivex-debugsource-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • hivex-devel-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • libguestfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-bash-completion-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-benchmarking-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-benchmarking-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-debugsource-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-devel-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-gfs2-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-gobject-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-gobject-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-gobject-devel-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-inspect-icons-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-java-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-java-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-java-devel-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-javadoc-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-man-pages-ja-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-man-pages-uk-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-rescue-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-rsync-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-tools-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-tools-c-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-tools-c-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libguestfs-winsupport-0:8.0-2.module+el8.0.0.z+3438+2851622e
  • libguestfs-xfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • libiscsi-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libiscsi-debuginfo-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libiscsi-debugsource-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libiscsi-devel-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libiscsi-utils-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libiscsi-utils-debuginfo-0:1.18.0-6.module+el8.0.0.z+3438+2851622e
  • libssh2-0:1.8.0-7.module+el8.0.0.z+3438+2851622e.1
  • libssh2-debuginfo-0:1.8.0-7.module+el8.0.0.z+3438+2851622e.1
  • libssh2-debugsource-0:1.8.0-7.module+el8.0.0.z+3438+2851622e.1
  • libvirt-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-admin-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-admin-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-bash-completion-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-client-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-client-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-config-network-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-config-nwfilter-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-interface-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-interface-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-network-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-network-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-nodedev-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-nodedev-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-nwfilter-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-nwfilter-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-qemu-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-qemu-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-secret-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-secret-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-core-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-core-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-disk-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-disk-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-gluster-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-gluster-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-iscsi-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-iscsi-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-iscsi-direct-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-iscsi-direct-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-logical-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-logical-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-mpath-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-mpath-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-rbd-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-rbd-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-scsi-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-driver-storage-scsi-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-daemon-kvm-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-dbus-0:1.3.0-1.module+el8.0.0.z+3438+2851622e
  • libvirt-dbus-debuginfo-0:1.3.0-1.module+el8.0.0.z+3438+2851622e
  • libvirt-dbus-debugsource-0:1.3.0-1.module+el8.0.0.z+3438+2851622e
  • libvirt-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-debugsource-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-devel-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-docs-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-libs-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-libs-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-lock-sanlock-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-lock-sanlock-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-nss-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-nss-debuginfo-0:5.0.0-7.2.module+el8.0.0.z+3438+2851622e
  • libvirt-python-debugsource-0:5.0.0-3.module+el8.0.0.z+3438+2851622e
  • lua-guestfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • lua-guestfs-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • nbdkit-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-bash-completion-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-basic-plugins-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-basic-plugins-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-debugsource-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-devel-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-example-plugins-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-example-plugins-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-gzip-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-gzip-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-python-common-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-python3-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-python3-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-vddk-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-vddk-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-xz-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • nbdkit-plugin-xz-debuginfo-0:1.4.2-4.module+el8.0.0.z+3438+2851622e
  • netcf-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • netcf-debuginfo-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • netcf-debugsource-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • netcf-devel-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • netcf-libs-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • netcf-libs-debuginfo-0:0.2.8-10.module+el8.0.0.z+3438+2851622e
  • perl-Sys-Guestfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • perl-Sys-Guestfs-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • perl-Sys-Virt-0:5.0.0-1.module+el8.0.0.z+3438+2851622e
  • perl-Sys-Virt-debuginfo-0:5.0.0-1.module+el8.0.0.z+3438+2851622e
  • perl-Sys-Virt-debugsource-0:5.0.0-1.module+el8.0.0.z+3438+2851622e
  • perl-hivex-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • perl-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • python3-hivex-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • python3-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • python3-libguestfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • python3-libguestfs-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • python3-libvirt-0:5.0.0-3.module+el8.0.0.z+3438+2851622e
  • python3-libvirt-debuginfo-0:5.0.0-3.module+el8.0.0.z+3438+2851622e
  • qemu-guest-agent-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-guest-agent-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-img-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-img-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-curl-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-curl-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-gluster-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-gluster-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-iscsi-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-iscsi-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-rbd-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-rbd-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-ssh-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-block-ssh-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-common-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-common-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-core-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-core-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-debuginfo-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • qemu-kvm-debugsource-15:3.1.0-20.module+el8.0.0.z+3438+2851622e.1
  • ruby-hivex-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • ruby-hivex-debuginfo-0:1.3.15-6.module+el8.0.0.z+3438+2851622e
  • ruby-libguestfs-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • ruby-libguestfs-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • seabios-0:1.12.0-1.module+el8.0.0.z+3438+2851622e
  • seabios-bin-0:1.12.0-1.module+el8.0.0.z+3438+2851622e
  • seavgabios-bin-0:1.12.0-1.module+el8.0.0.z+3438+2851622e
  • sgabios-1:0.20170427git-2.module+el8.0.0.z+3438+2851622e
  • sgabios-bin-1:0.20170427git-2.module+el8.0.0.z+3438+2851622e
  • supermin-0:5.1.19-8.module+el8.0.0.z+3438+2851622e
  • supermin-debuginfo-0:5.1.19-8.module+el8.0.0.z+3438+2851622e
  • supermin-debugsource-0:5.1.19-8.module+el8.0.0.z+3438+2851622e
  • supermin-devel-0:5.1.19-8.module+el8.0.0.z+3438+2851622e
  • virt-dib-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • virt-dib-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • virt-p2v-maker-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • virt-v2v-1:1.40.2-1.module+el8.0.0.z+3438+2851622e
  • virt-v2v-debuginfo-1:1.40.2-1.module+el8.0.0.z+3438+2851622e