Vulnerabilities > CVE-2019-9824 - Use of Uninitialized Resource vulnerability in Qemu 3.0.0

047910
CVSS 5.5 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
local
low complexity
qemu
CWE-908
nessus

Summary

tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

Vulnerable Configurations

Part Description Count
Application
Qemu
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-14001-1.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140). Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). Other issues fixed: Fixed an issue where VMs crashing when migrating between dom0 hosts (bsc#1031382). Upstream bug fixes (bsc#1027519) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123637
    published2019-04-02
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123637
    titleSUSE SLES11 Security Update : xen (SUSE-SU-2019:14001-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2019:14001-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123637);
      script_version("1.1");
      script_cvs_date("Date: 2019/04/02 10:22:09");
    
      script_cve_id("CVE-2019-6778", "CVE-2019-9824");
    
      script_name(english:"SUSE SLES11 Security Update : xen (SUSE-SU-2019:14001-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for xen fixes the following issues :
    
    Security issues fixed :
    
    Fixed multiple access violations introduced by XENMEM_exchange
    hypercall which could allow a single PV guest to leak arbitrary
    amounts of memory, leading to a denial of service (bsc#1126192).
    
    Fixed an issue which could allow a malicious unprivileged guest
    userspace process to escalate its privilege to that of other userspace
    processes in the same guest and potentially thereby to that of the
    guest operating system (bsc#1126201).
    
    Fixed an issue which could allow an untrusted PV domain with access to
    a physical device to DMA into its own pagetables leading to privilege
    escalation (bsc#1126195).
    
    Fixed an issue which could allow a malicious or buggy x86 PV guest
    kernels can mount a Denial of Service attack affecting the whole
    system (bsc#1126196).
    
    CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in
    slirp (bsc#1123157).
    
    Fixed an issue which could allow malicious PV guests may cause a host
    crash or gain access to data pertaining to other guests.Additionally,
    vulnerable configurations are likely to be unstable even in the
    absence of an attack (bsc#1126198).
    
    Fixed an issue which could allow malicious 64bit PV guests to cause a
    host crash (bsc#1127400).
    
    Fixed an issue which could allow malicious or buggy guests with passed
    through PCI devices to be able to escalate their privileges, crash the
    host, or access data belonging to other guests. Additionally memory
    leaks were also possible (bsc#1126140).
    
    Fixed a race condition issue which could allow malicious PV guests to
    escalate their privilege to that of the hypervisor (bsc#1126141).
    
    CVE-2019-9824: Fixed an information leak in SLiRP networking
    implementation which could allow a user/process to read uninitialised
    stack memory contents (bsc#1129623).
    
    Other issues fixed: Fixed an issue where VMs crashing when migrating
    between dom0 hosts (bsc#1031382).
    
    Upstream bug fixes (bsc#1027519)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1027519"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1031382"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1123157"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126140"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126141"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126192"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126195"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126196"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126198"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1126201"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1127400"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1129623"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-6778/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2019-9824/"
      );
      # https://www.suse.com/support/update/announcement/2019/suse-su-201914001-1.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?6757a2c0"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t
    patch sdksp4-xen-14001=1
    
    SUSE Linux Enterprise Server 11-SP4:zypper in -t patch
    slessp4-xen-14001=1
    
    SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch
    dbgsp4-xen-14001=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-doc-html");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-kmp-default");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-kmp-pae");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-tools-domU");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/02");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = eregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^(SLES11)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES11", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    if (cpu >!< "i386|i486|i586|i686|x86_64") audit(AUDIT_ARCH_NOT, "i386 / i486 / i586 / i686 / x86_64", cpu);
    
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES11" && (! ereg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES11 SP4", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-libs-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-tools-domU-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-doc-html-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-libs-32bit-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-tools-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-libs-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-tools-domU-4.4.4_40-61.43.2")) flag++;
    if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xen");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2227.NASL
    descriptionAccording to the versions of the qemu-kvm packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.(CVE-2019-6778) - The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.(CVE-2015-7549) - The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.(CVE-2016-2841) - Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.(CVE-2017-9374) - Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).(CVE-2017-18043) - Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.(CVE-2017-5579) - The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.(CVE-2015-4037) - The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.(CVE-2016-7908) - hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.(CVE-2013-4544) - Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.(CVE-2016-2538) - Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.(CVE-2018-10839) - Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.(CVE-2017-9373) - tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.(CVE-2019-9824) - QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.(CVE-2017-9503) - Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.(CVE-2013-4526) - Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.(CVE-2013-4530) - Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.(CVE-2013-4539) - Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.(CVE-2013-4540) - The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer.(CVE-2017-5987) - Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12126) - Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12127) - Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12130) - Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2019-11091) - interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference.(CVE-2019-12155) - Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.(CVE-2016-7161) - Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.(CVE-2015-5279) - The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.(CVE-2017-5667) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-11-08
    plugin id130689
    published2019-11-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130689
    titleEulerOS 2.0 SP5 : qemu-kvm (EulerOS-SA-2019-2227)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(130689);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/07");
    
      script_cve_id(
        "CVE-2013-4526",
        "CVE-2013-4530",
        "CVE-2013-4539",
        "CVE-2013-4540",
        "CVE-2013-4544",
        "CVE-2015-4037",
        "CVE-2015-5279",
        "CVE-2015-7549",
        "CVE-2016-2538",
        "CVE-2016-2841",
        "CVE-2016-7161",
        "CVE-2016-7908",
        "CVE-2017-18043",
        "CVE-2017-5579",
        "CVE-2017-5667",
        "CVE-2017-5987",
        "CVE-2017-9373",
        "CVE-2017-9374",
        "CVE-2017-9503",
        "CVE-2018-10839",
        "CVE-2018-12126",
        "CVE-2018-12127",
        "CVE-2018-12130",
        "CVE-2019-11091",
        "CVE-2019-12155",
        "CVE-2019-6778",
        "CVE-2019-9824"
      );
      script_bugtraq_id(
        66955,
        67483,
        74809
      );
    
      script_name(english:"EulerOS 2.0 SP5 : qemu-kvm (EulerOS-SA-2019-2227)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the qemu-kvm packages installed, the
    EulerOS installation on the remote host is affected by the following
    vulnerabilities :
    
      - In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a
        heap-based buffer overflow.(CVE-2019-6778)
    
      - The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka
        Quick Emulator) allows local guest OS privileged users
        to cause a denial of service (NULL pointer dereference
        and QEMU process crash) by leveraging failure to define
        the .write method.(CVE-2015-7549)
    
      - The ne2000_receive function in the NE2000 NIC emulation
        support (hw/net/ne2000.c) in QEMU before 2.5.1 allows
        local guest OS administrators to cause a denial of
        service (infinite loop and QEMU process crash) via
        crafted values for the PSTART and PSTOP registers,
        involving ring buffer control.(CVE-2016-2841)
    
      - Memory leak in QEMU (aka Quick Emulator), when built
        with USB EHCI Emulation support, allows local guest OS
        privileged users to cause a denial of service (memory
        consumption) by repeatedly hot-unplugging the
        device.(CVE-2017-9374)
    
      - Integer overflow in the macro ROUND_UP (n, d) in Quick
        Emulator (Qemu) allows a user to cause a denial of
        service (Qemu process crash).(CVE-2017-18043)
    
      - Memory leak in the serial_exit_core function in
        hw/char/serial.c in QEMU (aka Quick Emulator) allows
        local guest OS privileged users to cause a denial of
        service (host memory consumption and QEMU process
        crash) via a large number of device unplug
        operations.(CVE-2017-5579)
    
      - The slirp_smb function in net/slirp.c in QEMU 2.3.0 and
        earlier creates temporary files with predictable names,
        which allows local users to cause a denial of service
        (instantiation failure) by creating /tmp/qemu-smb.*-*
        files before the program.(CVE-2015-4037)
    
      - The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU
        (aka Quick Emulator) does not properly limit the buffer
        descriptor count when transmitting packets, which
        allows local guest OS administrators to cause a denial
        of service (infinite loop and QEMU process crash) via
        vectors involving a buffer descriptor with a length of
        0 and crafted values in bd.flags.(CVE-2016-7908)
    
      - hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier
        allows local guest users to cause a denial of service
        or possibly execute arbitrary code via vectors related
        to (1) RX or (2) TX queue numbers or (3) interrupt
        indices. NOTE: some of these details are obtained from
        third party information.(CVE-2013-4544)
    
      - Multiple integer overflows in the USB Net device
        emulator (hw/usb/dev-network.c) in QEMU before 2.5.1
        allow local guest OS administrators to cause a denial
        of service (QEMU process crash) or obtain sensitive
        host memory information via a remote NDIS control
        message packet that is mishandled in the (1)
        rndis_query_response, (2) rndis_set_response, or (3)
        usb_net_handle_dataout function.(CVE-2016-2538)
    
      - Qemu emulator <= 3.0.0 built with the NE2000 NIC
        emulation support is vulnerable to an integer overflow,
        which could lead to buffer overflow issue. It could
        occur when receiving packets over the network. A user
        inside guest could use this flaw to crash the Qemu
        process resulting in DoS.(CVE-2018-10839)
    
      - Memory leak in QEMU (aka Quick Emulator), when built
        with IDE AHCI Emulation support, allows local guest OS
        privileged users to cause a denial of service (memory
        consumption) by repeatedly hot-unplugging the AHCI
        device.(CVE-2017-9373)
    
      - tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c)
        in QEMU 3.0.0 uses uninitialized data in an snprintf
        call, leading to Information disclosure.(CVE-2019-9824)
    
      - QEMU (aka Quick Emulator), when built with MegaRAID SAS
        8708EM2 Host Bus Adapter emulation support, allows
        local guest OS privileged users to cause a denial of
        service (NULL pointer dereference and QEMU process
        crash) via vectors involving megasas command
        processing.(CVE-2017-9503)
    
      - Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2
        allows remote attackers to cause a denial of service
        and possibly execute arbitrary code via vectors related
        to migrating ports.(CVE-2013-4526)
    
      - Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2
        allows remote attackers to cause a denial of service or
        possibly execute arbitrary code via crafted
        tx_fifo_head and rx_fifo_head values in a savevm
        image.(CVE-2013-4530)
    
      - Multiple buffer overflows in the tsc210x_load function
        in hw/input/tsc210x.c in QEMU before 1.7.2 might allow
        remote attackers to execute arbitrary code via a
        crafted (1) precision, (2) nextprecision, (3) function,
        or (4) nextfunction value in a savevm
        image.(CVE-2013-4539)
    
      - Buffer overflow in scoop_gpio_handler_update in QEMU
        before 1.7.2 might allow remote attackers to execute
        arbitrary code via a large (1) prev_level, (2)
        gpio_level, or (3) gpio_dir value in a savevm
        image.(CVE-2013-4540)
    
      - The sdhci_sdma_transfer_multi_blocks function in
        hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local
        OS guest privileged users to cause a denial of service
        (infinite loop and QEMU process crash) via vectors
        involving the transfer mode register during multi block
        transfer.(CVE-2017-5987)
    
      - Microarchitectural Store Buffer Data Sampling (MSBDS):
        Store buffers on some microprocessors utilizing
        speculative execution may allow an authenticated user
        to potentially enable information disclosure via a side
        channel with local access. A list of impacted products
        can be found here:
        https://www.intel.com/content/dam/www/public/us/en/docu
        ments/corporate-information/SA00233-microcode-update-gu
        idance_05132019.pdf(CVE-2018-12126)
    
      - Microarchitectural Load Port Data Sampling (MLPDS):
        Load ports on some microprocessors utilizing
        speculative execution may allow an authenticated user
        to potentially enable information disclosure via a side
        channel with local access. A list of impacted products
        can be found here:
        https://www.intel.com/content/dam/www/public/us/en/docu
        ments/corporate-information/SA00233-microcode-update-gu
        idance_05132019.pdf(CVE-2018-12127)
    
      - Microarchitectural Fill Buffer Data Sampling (MFBDS):
        Fill buffers on some microprocessors utilizing
        speculative execution may allow an authenticated user
        to potentially enable information disclosure via a side
        channel with local access. A list of impacted products
        can be found here:
        https://www.intel.com/content/dam/www/public/us/en/docu
        ments/corporate-information/SA00233-microcode-update-gu
        idance_05132019.pdf(CVE-2018-12130)
    
      - Microarchitectural Data Sampling Uncacheable Memory
        (MDSUM): Uncacheable memory on some microprocessors
        utilizing speculative execution may allow an
        authenticated user to potentially enable information
        disclosure via a side channel with local access. A list
        of impacted products can be found here:
        https://www.intel.com/content/dam/www/public/us/en/docu
        ments/corporate-information/SA00233-microcode-update-gu
        idance_05132019.pdf(CVE-2019-11091)
    
      - interface_release_resource in hw/display/qxl.c in QEMU
        4.0.0 has a NULL pointer dereference.(CVE-2019-12155)
    
      - Heap-based buffer overflow in the .receive callback of
        xlnx.xps-ethernetlite in QEMU (aka Quick Emulator)
        allows attackers to execute arbitrary code on the QEMU
        host via a large ethlite packet.(CVE-2016-7161)
    
      - Heap-based buffer overflow in the ne2000_receive
        function in hw/net/ne2000.c in QEMU before 2.4.0.1
        allows guest OS users to cause a denial of service
        (instance crash) or possibly execute arbitrary code via
        vectors related to receiving packets.(CVE-2015-5279)
    
      - The sdhci_sdma_transfer_multi_blocks function in
        hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local
        guest OS privileged users to cause a denial of service
        (out-of-bounds heap access and crash) or execute
        arbitrary code on the QEMU host via vectors involving
        the data transfer length.(CVE-2017-5667)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2227
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?95b359a0");
      script_set_attribute(attribute:"solution", value:
    "Update the affected qemu-kvm packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/10/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/08");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:qemu-img");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:qemu-kvm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:qemu-kvm-common");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(5)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["qemu-img-1.5.3-156.5.h14.eulerosv2r7",
            "qemu-kvm-1.5.3-156.5.h14.eulerosv2r7",
            "qemu-kvm-common-1.5.3-156.5.h14.eulerosv2r7"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"5", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu-kvm");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0921-1.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140). Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host, resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988) Other issue addressed: Added Xen cmdline option
    last seen2020-06-01
    modified2020-06-02
    plugin id123993
    published2019-04-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123993
    titleSUSE SLES12 Security Update : xen (SUSE-SU-2019:0921-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1272-1.NASL
    descriptionThis update for qemu fixes the following issues : Security issues fixed : CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622) CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675) CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature
    last seen2020-06-01
    modified2020-06-02
    plugin id125249
    published2019-05-17
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125249
    titleSUSE SLES12 Security Update : qemu (SUSE-SU-2019:1272-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4454.NASL
    descriptionMultiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service, the execution of arbitrary code or information disclosure. In addition this update backports support to passthrough the new md-clear CPU flag added in the intel-microcode update shipped in DSA 4447 to x86-based guests.
    last seen2020-06-01
    modified2020-06-02
    plugin id125609
    published2019-05-31
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125609
    titleDebian DSA-4454-1 : qemu - security update
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1269-1.NASL
    descriptionThis update for qemu fixes the following issues : Following security issues were fixed : CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622) CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675) CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature
    last seen2020-06-01
    modified2020-06-02
    plugin id125248
    published2019-05-17
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125248
    titleSUSE SLES12 Security Update : qemu (SUSE-SU-2019:1269-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0168_QEMU-KVM.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.05, has qemu-kvm packages installed that are affected by a vulnerability: - tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure. (CVE-2019-9824) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127457
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127457
    titleNewStart CGSL MAIN 4.05 : qemu-kvm Vulnerability (NS-SA-2019-0168)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1268-1.NASL
    descriptionThis update for qemu fixes the following issues : Following security issues were fixed : CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622) CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675) CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature
    last seen2020-06-01
    modified2020-06-02
    plugin id125247
    published2019-05-17
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125247
    titleSUSE SLES12 Security Update : qemu (SUSE-SU-2019:1268-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190702_QEMU_KVM_ON_SL6_X.NASL
    descriptionSecurity Fix(es) : - QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
    last seen2020-03-18
    modified2019-07-03
    plugin id126455
    published2019-07-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126455
    titleScientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20190702)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1650.NASL
    descriptionFrom Red Hat Security Advisory 2019:1650 : An update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es) : * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id126450
    published2019-07-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126450
    titleOracle Linux 6 : qemu-kvm (ELSA-2019-1650)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201904-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201904-25 (QEMU: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details. Impact : Please review the referenced CVE identifiers for details. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id124289
    published2019-04-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124289
    titleGLSA-201904-25 : QEMU: Multiple vulnerabilities
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-2078.NASL
    descriptionAn update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es) : * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id128348
    published2019-08-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128348
    titleCentOS 7 : qemu-kvm (CESA-2019:2078)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2553.NASL
    descriptionAn update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 4.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix(es) : * A flaw was found in the implementation of the
    last seen2020-06-01
    modified2020-06-02
    plugin id128205
    published2019-08-27
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128205
    titleRHEL 7 : Virtualization Manager (RHSA-2019:2553) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3345.NASL
    descriptionAn update for the virt:rhel module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es) : * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: NULL pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
    last seen2020-05-23
    modified2019-11-06
    plugin id130529
    published2019-11-06
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130529
    titleRHEL 8 : virt:rhel (RHSA-2019:3345)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3978-1.NASL
    descriptionKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12130) Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12127) Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12126) Kurtis Miller discovered that a buffer overflow existed in QEMU when loading a device tree blob. A local attacker could use this to execute arbitrary code. (CVE-2018-20815) Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11091) It was discovered that a NULL pointer dereference existed in the sun4u power device implementation in QEMU. A local attacker could use this to cause a denial of service. This issue only affected Ubuntu 18.10 and Ubuntu 19.04. (CVE-2019-5008) William Bowling discovered that an information leak existed in the SLiRP networking implementation of QEMU. An attacker could use this to expose sensitive information. (CVE-2019-9824). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125137
    published2019-05-15
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125137
    titleUbuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : qemu update (USN-3978-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-1650.NASL
    descriptionAn update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es) : * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id126479
    published2019-07-05
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126479
    titleCentOS 6 : qemu-kvm (CESA-2019:1650)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1274.NASL
    descriptionThis update for qemu fixes the following issues : Security issues fixed : - CVE-2019-9824: Fixed information leak in slirp (bsc#1129622). - CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 hostinformation (bsc#1126455). - CVE-2019-3812: Fixed Out-of-bounds memory access and information leak in virtual monitor interface (bsc#1125721). - CVE-2018-20815: Fixed a denial of service possibility in device tree processing (bsc#1130675). Non-security issue fixed : - Backported Skylake-Server vcpu model support from qemu v2.11 (FATE#327261 bsc#1131955). - Added ability to set virtqueue size using virtqueue_size parameter (FATE#327255 bsc#1118900). This update was imported from the SUSE:SLE-12-SP3:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id124311
    published2019-04-26
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124311
    titleopenSUSE Security Update : qemu (openSUSE-2019-1274)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1650.NASL
    descriptionAn update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es) : * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id126452
    published2019-07-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126452
    titleRHEL 6 : qemu-kvm (RHSA-2019:1650)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1248.NASL
    descriptionA heap buffer overflow issue was found in the load_device_tree() function of QEMU, which is invoked to load a device tree blob at boot time. It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type. A user/process could use this flaw to potentially execute arbitrary code on a host system with privileges of the QEMU process. (CVE-2018-20815) hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver. (CVE-2019-5008) Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) qxl: NULL pointer dereference while releasing spice resources (CVE-2019-12155)
    last seen2020-06-01
    modified2020-06-02
    plugin id126960
    published2019-07-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126960
    titleAmazon Linux 2 : qemu (ALAS-2019-1248)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1226.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : - CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host, resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988) - CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). - Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140). - Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). - Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). - CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). - CVE-2018-19961 CVE-2018-19962: Fixed insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)(bsc#1115040). - CVE-2018-19965: Fixed denial of service issue from attempting to use INVPCID with a non-canonical addresses (XSA-279)(bsc#1115045). - CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047). - Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). - Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). - Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). - Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service attack affecting the whole system (bsc#1126197). - Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). - Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). Other issues addressed : - Upstream bug fixes (bsc#1027519) - Fixed an issue where live migrations were failing when spectre was enabled on xen boot cmdline (bsc#1116380). - Fixed an issue where setup of grant_tables and other variables may fail (bsc#1126325). - Fixed a building issue (bsc#1119161). - Fixed an issue where xpti=no-dom0 was not working as expected (bsc#1105528). - Packages should no longer use /var/adm/fillup-templates (bsc#1069468). - Added Xen cmdline option
    last seen2020-06-01
    modified2020-06-02
    plugin id124147
    published2019-04-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124147
    titleopenSUSE Security Update : xen (openSUSE-2019-1226)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190806_QEMU_KVM_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)
    last seen2020-03-18
    modified2019-08-27
    plugin id128257
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128257
    titleScientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20190806)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0825-1.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the
    last seen2020-06-01
    modified2020-06-02
    plugin id123633
    published2019-04-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123633
    titleSUSE SLES12 Security Update : xen (SUSE-SU-2019:0825-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-14052-1.NASL
    descriptionThis update for kvm fixes the following issues : CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622) CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675) CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature
    last seen2020-06-01
    modified2020-06-02
    plugin id125284
    published2019-05-20
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125284
    titleSUSE SLES11 Security Update : kvm (SUSE-SU-2019:14052-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-52A8F5468E.NASL
    description - CVE-2019-12155: qxl: NULL pointer dereference while releasing spice resources (bz #1712727, bz #1712670) - CVE-2019-5008: NULL pointer dereference in hw/sparc64/sun4u.c leading to DoS (bz #1705916, bz #1705915) - CVE-2018-20815: device_tree: heap buffer overflow while loading device tree blob (bz #1693117, bz #1693101) - CVE-2019-9824: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (bz #1689794, bz #1678515) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126530
    published2019-07-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126530
    titleFedora 30 : 2:qemu (2019-52a8f5468e)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0827-1.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). CVE-2017-13672: Fixed an out of bounds read access during display update (bsc#1056336). Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140) Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). CVE-2018-18849: Fixed an out of bounds msg buffer access which could lead to denial of service (bsc#1114423). Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the rtl8139 component (bsc#1111007) CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host, resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988) CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in various Bluetooth functions, allowing this to crash qemu process resulting in Denial of Service (DoS). (bsc#1117756). CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB flushing with AMD IOMMUs, which potentially allowed a guest to escalate its privileges, may cause a Denial of Service (DoS) affecting the entire host, or may be able to access data it is not supposed to access. (XSA-275) (bsc#1115040) CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which conflicted with shadow paging and allowed a guest to cause Xen to crash, resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047). CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in the ne2000 component (bsc#1110924). CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case non-canonical addresses are accessed, which may allow a guest to cause Xen to crash, resulting in a Denial of Service (DoS) affecting the entire host. (XSA-279) (bsc#1115045). Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes, leading to a denial of service (DoS). (bsc#1111014). Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the pcnet component (bsc#1111011) CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could lead to memory corruption (bsc#1112188). Other issues fixed: Upstream bug fixes (bsc#1027519) Fixed an issue where XEN SLE12-SP1 domU hangs on SLE12-SP3 HV1108940 (bsc#1108940). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123634
    published2019-04-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123634
    titleSUSE SLES12 Security Update : xen (SUSE-SU-2019:0827-1)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1405.NASL
    descriptionThis update for qemu fixes the following issues : Security issues fixed : - CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622) - CVE-2019-8934: Added method to specify whether or not to expose certain ppc64 host information, which can be considered a security issue (bsc#1126455) - CVE-2019-3812: Fixed OOB memory access and information leak in virtual monitor interface (bsc#1125721) - CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675) - Adjust fix for CVE-2019-8934 (bsc#1126455) to match the latest upstream adjustments for the same. Basically now the security fix is to provide a dummy host-model and host-serial value, which overrides getting that value from the host - CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature
    last seen2020-06-01
    modified2020-06-02
    plugin id125302
    published2019-05-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125302
    titleopenSUSE Security Update : qemu (openSUSE-2019-1405) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1781.NASL
    descriptionSeveral vulnerabilities were found in QEMU, a fast processor emulator : CVE-2018-11806 It was found that the SLiRP networking implementation could use a wrong size when reallocating its buffers, which can be exploited by a priviledged user on a guest to cause denial of service or possibly arbitrary code execution on the host system. CVE-2018-18849 It was found that the LSI53C895A SCSI Host Bus Adapter emulation was susceptible to an out of bounds memory access, which could be leveraged by a malicious guest user to crash the QEMU process. CVE-2018-20815 A heap buffer overflow was found in the load_device_tree function, which could be used by a malicious user to potentially execute arbitrary code with the priviledges of the QEMU process. CVE-2019-9824 William Bowling discovered that the SLiRP networking implementation did not handle some messages properly, which could be triggered to leak memory via crafted messages. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id124720
    published2019-05-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124720
    titleDebian DLA-1781-1 : qemu security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2255.NASL
    descriptionAccording to the versions of the qemu-kvm packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.(CVE-2019-9824) - interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference.(CVE-2019-12155) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-11-08
    plugin id130717
    published2019-11-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130717
    titleEulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2019-2255)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0891-1.NASL
    descriptionThis update for xen fixes the following issues : Security issues fixed : Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). Fixed an issue which could allow malicious or buggy x86 PV guest kernels to mount a Denial of Service attack affecting the whole system (bsc#1126197). Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140). Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). Other issues addressed: Upstream bug fixes (bsc#1027519) Packages should no longer use /var/adm/fillup-templates (bsc#1069468). Added Xen cmdline option
    last seen2020-06-01
    modified2020-06-02
    plugin id123825
    published2019-04-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123825
    titleSUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2019:0891-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2078.NASL
    descriptionAn update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es) : * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id127667
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127667
    titleRHEL 7 : qemu-kvm (RHSA-2019:2078)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0176_QEMU-KVM.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.06, has qemu-kvm packages installed that are affected by a vulnerability: - tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure. (CVE-2019-9824) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id128688
    published2019-09-11
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128688
    titleNewStart CGSL MAIN 4.06 : qemu-kvm Vulnerability (NS-SA-2019-0176)

Redhat

advisories
  • bugzilla
    id1678515
    titleCVE-2019-9824 QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentqemu-guest-agent is earlier than 2:0.12.1.2-2.506.el6_10.4
            ovaloval:com.redhat.rhsa:tst:20191650001
          • commentqemu-guest-agent is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20121234002
        • AND
          • commentqemu-kvm-tools is earlier than 2:0.12.1.2-2.506.el6_10.4
            ovaloval:com.redhat.rhsa:tst:20191650003
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-kvm is earlier than 2:0.12.1.2-2.506.el6_10.4
            ovaloval:com.redhat.rhsa:tst:20191650005
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
        • AND
          • commentqemu-img is earlier than 2:0.12.1.2-2.506.el6_10.4
            ovaloval:com.redhat.rhsa:tst:20191650007
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
    rhsa
    idRHSA-2019:1650
    released2019-07-02
    severityLow
    titleRHSA-2019:1650: qemu-kvm security update (Low)
  • bugzilla
    id1709495
    titleChange CPUID[0x40000000].EAX from 0 to KVM_CPUID_FE...ATURES (0x40000001)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentqemu-kvm-tools is earlier than 10:1.5.3-167.el7
            ovaloval:com.redhat.rhsa:tst:20192078001
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-kvm-common is earlier than 10:1.5.3-167.el7
            ovaloval:com.redhat.rhsa:tst:20192078003
          • commentqemu-kvm-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704004
        • AND
          • commentqemu-img is earlier than 10:1.5.3-167.el7
            ovaloval:com.redhat.rhsa:tst:20192078005
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
        • AND
          • commentqemu-kvm is earlier than 10:1.5.3-167.el7
            ovaloval:com.redhat.rhsa:tst:20192078007
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
    rhsa
    idRHSA-2019:2078
    released2019-08-06
    severityLow
    titleRHSA-2019:2078: qemu-kvm security, bug fix, and enhancement update (Low)
  • bugzilla
    id1749227
    title[cgroup_v2] schedinfo cmd cannot set vcpu/emulator/global/iothread period values
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 8 is installed
        ovaloval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • commentModule virt:rhel is enabled
            ovaloval:com.redhat.rhsa:tst:20191175217
          • OR
            • AND
              • commentpython3-libguestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345001
              • commentpython3-libguestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175046
            • AND
              • commentpython3-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345003
              • commentpython3-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175048
            • AND
              • commentperl-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345005
              • commentperl-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301002
            • AND
              • commentperl-Sys-Virt-debugsource is earlier than 0:4.5.0-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345007
              • commentperl-Sys-Virt-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175052
            • AND
              • commentperl-Sys-Virt is earlier than 0:4.5.0-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345009
              • commentperl-Sys-Virt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175054
            • AND
              • commentperl-Sys-Guestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345011
              • commentperl-Sys-Guestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586016
            • AND
              • commentnetcf-libs is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345013
              • commentnetcf-libs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307002
            • AND
              • commentnetcf-devel is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345015
              • commentnetcf-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307004
            • AND
              • commentnetcf-debugsource is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345017
              • commentnetcf-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175062
            • AND
              • commentnetcf is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345019
              • commentnetcf is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307006
            • AND
              • commentnbdkit-plugin-xz is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345021
              • commentnbdkit-plugin-xz is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175066
            • AND
              • commentnbdkit-plugin-python3 is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345023
              • commentnbdkit-plugin-python3 is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175070
            • AND
              • commentnbdkit-plugin-python-common is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345025
              • commentnbdkit-plugin-python-common is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175072
            • AND
              • commentnbdkit-plugin-gzip is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345027
              • commentnbdkit-plugin-gzip is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175074
            • AND
              • commentnbdkit-example-plugins is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345029
              • commentnbdkit-example-plugins is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175076
            • AND
              • commentnbdkit-devel is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345031
              • commentnbdkit-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175078
            • AND
              • commentnbdkit-debugsource is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345033
              • commentnbdkit-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175080
            • AND
              • commentnbdkit-basic-plugins is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345035
              • commentnbdkit-basic-plugins is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175082
            • AND
              • commentnbdkit is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345037
              • commentnbdkit is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175084
            • AND
              • commentlua-guestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345039
              • commentlua-guestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576024
            • AND
              • commentlibvirt-python-debugsource is earlier than 0:4.5.0-2.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345041
              • commentlibvirt-python-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191268088
            • AND
              • commentlibvirt-nss is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345043
              • commentlibvirt-nss is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162577036
            • AND
              • commentlibvirt-lock-sanlock is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345045
              • commentlibvirt-lock-sanlock is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581002
            • AND
              • commentlibvirt-libs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345047
              • commentlibvirt-libs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029018
            • AND
              • commentlibvirt-docs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345049
              • commentlibvirt-docs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914028
            • AND
              • commentlibvirt-devel is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345051
              • commentlibvirt-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581004
            • AND
              • commentlibvirt-debugsource is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345053
              • commentlibvirt-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175098
            • AND
              • commentlibvirt-dbus-debugsource is earlier than 0:1.2.0-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345055
              • commentlibvirt-dbus-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175100
            • AND
              • commentlibvirt-dbus is earlier than 0:1.2.0-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345057
              • commentlibvirt-dbus is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175102
            • AND
              • commentlibvirt-daemon-kvm is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345059
              • commentlibvirt-daemon-kvm is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914022
            • AND
              • commentlibvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345061
              • commentlibvirt-daemon-driver-storage-scsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029028
            • AND
              • commentlibvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345063
              • commentlibvirt-daemon-driver-storage-rbd is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029040
            • AND
              • commentlibvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345065
              • commentlibvirt-daemon-driver-storage-mpath is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029026
            • AND
              • commentlibvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345067
              • commentlibvirt-daemon-driver-storage-logical is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029020
            • AND
              • commentlibvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345069
              • commentlibvirt-daemon-driver-storage-iscsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029014
            • AND
              • commentlibvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345071
              • commentlibvirt-daemon-driver-storage-gluster is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029048
            • AND
              • commentlibvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345073
              • commentlibvirt-daemon-driver-storage-disk is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029008
            • AND
              • commentlibvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345075
              • commentlibvirt-daemon-driver-storage-core is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029010
            • AND
              • commentlibvirt-daemon-driver-storage is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345077
              • commentlibvirt-daemon-driver-storage is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914040
            • AND
              • commentlibvirt-daemon-driver-secret is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345079
              • commentlibvirt-daemon-driver-secret is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914024
            • AND
              • commentlibvirt-daemon-driver-qemu is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345081
              • commentlibvirt-daemon-driver-qemu is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914016
            • AND
              • commentlibvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345083
              • commentlibvirt-daemon-driver-nwfilter is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914002
            • AND
              • commentlibvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345085
              • commentlibvirt-daemon-driver-nodedev is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914006
            • AND
              • commentlibvirt-daemon-driver-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345087
              • commentlibvirt-daemon-driver-network is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914010
            • AND
              • commentlibvirt-daemon-driver-interface is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345089
              • commentlibvirt-daemon-driver-interface is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914012
            • AND
              • commentlibvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345091
              • commentlibvirt-daemon-config-nwfilter is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914020
            • AND
              • commentlibvirt-daemon-config-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345093
              • commentlibvirt-daemon-config-network is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914026
            • AND
              • commentlibvirt-daemon is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345095
              • commentlibvirt-daemon is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914008
            • AND
              • commentlibvirt-client is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345097
              • commentlibvirt-client is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581008
            • AND
              • commentlibvirt-bash-completion is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345099
              • commentlibvirt-bash-completion is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20183113026
            • AND
              • commentlibvirt-admin is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345101
              • commentlibvirt-admin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029056
            • AND
              • commentlibvirt is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345103
              • commentlibvirt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581010
            • AND
              • commentlibiscsi-utils is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345105
              • commentlibiscsi-utils is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175154
            • AND
              • commentlibiscsi-devel is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345107
              • commentlibiscsi-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175156
            • AND
              • commentlibiscsi-debugsource is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345109
              • commentlibiscsi-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175158
            • AND
              • commentlibiscsi is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345111
              • commentlibiscsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175160
            • AND
              • commentlibguestfs-xfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345113
              • commentlibguestfs-xfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576046
            • AND
              • commentlibguestfs-winsupport is earlier than 0:8.0-4.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345115
              • commentlibguestfs-winsupport is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175164
            • AND
              • commentlibguestfs-tools-c is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345117
              • commentlibguestfs-tools-c is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586024
            • AND
              • commentlibguestfs-rsync is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345119
              • commentlibguestfs-rsync is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576036
            • AND
              • commentlibguestfs-rescue is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345121
              • commentlibguestfs-rescue is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576018
            • AND
              • commentlibguestfs-java-devel is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345123
              • commentlibguestfs-java-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586014
            • AND
              • commentlibguestfs-java is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345125
              • commentlibguestfs-java is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586022
            • AND
              • commentlibguestfs-gobject-devel is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345127
              • commentlibguestfs-gobject-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576034
            • AND
              • commentlibguestfs-gobject is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345129
              • commentlibguestfs-gobject is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576020
            • AND
              • commentlibguestfs-gfs2 is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345131
              • commentlibguestfs-gfs2 is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576026
            • AND
              • commentlibguestfs-devel is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345133
              • commentlibguestfs-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586002
            • AND
              • commentlibguestfs-debugsource is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345135
              • commentlibguestfs-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175184
            • AND
              • commentlibguestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345137
              • commentlibguestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586028
            • AND
              • commenthivex-devel is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345139
              • commenthivex-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301010
            • AND
              • commenthivex-debugsource is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345141
              • commenthivex-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175190
            • AND
              • commenthivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345143
              • commenthivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301004
            • AND
              • commentvirt-dib is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345145
              • commentvirt-dib is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576014
            • AND
              • commentsupermin-devel is earlier than 0:5.1.19-9.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345147
              • commentsupermin-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175008
            • AND
              • commentsupermin-debugsource is earlier than 0:5.1.19-9.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345149
              • commentsupermin-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175010
            • AND
              • commentsupermin is earlier than 0:5.1.19-9.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345151
              • commentsupermin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175012
            • AND
              • commentruby-libguestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345153
              • commentruby-libguestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586012
            • AND
              • commentruby-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345155
              • commentruby-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301006
            • AND
              • commentqemu-kvm-debugsource is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345157
              • commentqemu-kvm-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175022
            • AND
              • commentqemu-kvm-core is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345159
              • commentqemu-kvm-core is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175024
            • AND
              • commentqemu-kvm-common is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345161
              • commentqemu-kvm-common is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140704004
            • AND
              • commentqemu-kvm-block-ssh is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345163
              • commentqemu-kvm-block-ssh is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175028
            • AND
              • commentqemu-kvm-block-rbd is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345165
              • commentqemu-kvm-block-rbd is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175030
            • AND
              • commentqemu-kvm-block-iscsi is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345167
              • commentqemu-kvm-block-iscsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175032
            • AND
              • commentqemu-kvm-block-curl is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345169
              • commentqemu-kvm-block-curl is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175036
            • AND
              • commentqemu-kvm is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345171
              • commentqemu-kvm is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110345004
            • AND
              • commentqemu-img is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345173
              • commentqemu-img is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110345006
            • AND
              • commentqemu-guest-agent is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345175
              • commentqemu-guest-agent is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20121234002
            • AND
              • commentpython3-libvirt is earlier than 0:4.5.0-2.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345177
              • commentpython3-libvirt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175044
            • AND
              • commentSLOF is earlier than 0:20171214-6.gitfa98132.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345179
              • commentSLOF is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175202
            • AND
              • commentsgabios-bin is earlier than 1:0.20170427git-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345181
              • commentsgabios-bin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175196
            • AND
              • commentseavgabios-bin is earlier than 0:1.11.1-4.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345183
              • commentseavgabios-bin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175198
            • AND
              • commentseabios-bin is earlier than 0:1.11.1-4.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345185
              • commentseabios-bin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175200
            • AND
              • commentnbdkit-bash-completion is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345187
              • commentnbdkit-bash-completion is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175204
            • AND
              • commentlibguestfs-tools is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345189
              • commentlibguestfs-tools is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586018
            • AND
              • commentlibguestfs-man-pages-uk is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345191
              • commentlibguestfs-man-pages-uk is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576010
            • AND
              • commentlibguestfs-man-pages-ja is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345193
              • commentlibguestfs-man-pages-ja is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576006
            • AND
              • commentlibguestfs-javadoc is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345195
              • commentlibguestfs-javadoc is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586010
            • AND
              • commentlibguestfs-inspect-icons is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345197
              • commentlibguestfs-inspect-icons is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576038
            • AND
              • commentlibguestfs-bash-completion is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345199
              • commentlibguestfs-bash-completion is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162576004
            • AND
              • commentvirt-v2v is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345201
              • commentvirt-v2v is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20111615002
            • AND
              • commentvirt-p2v-maker is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345203
              • commentvirt-p2v-maker is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175004
            • AND
              • commentsgabios is earlier than 1:0.20170427git-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345205
              • commentsgabios is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175014
            • AND
              • commentseabios is earlier than 0:1.11.1-4.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345207
              • commentseabios is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175016
            • AND
              • commentqemu-kvm-block-gluster is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345209
              • commentqemu-kvm-block-gluster is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175034
            • AND
              • commentnbdkit-plugin-vddk is earlier than 0:1.4.2-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345211
              • commentnbdkit-plugin-vddk is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175068
            • AND
              • commentlibguestfs-benchmarking is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345213
              • commentlibguestfs-benchmarking is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175194
        • AND
          • commentModule virt-devel:rhel is enabled
            ovaloval:com.redhat.rhsa:tst:20193345273
          • OR
            • AND
              • commentqemu-kvm-tests is earlier than 15:2.12.0-88.module+el8.1.0+4233+bc44be3f
                ovaloval:com.redhat.rhsa:tst:20193345216
              • commentqemu-kvm-tests is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20193345217
            • AND
              • commentocaml-libguestfs-devel is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345218
              • commentocaml-libguestfs-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586006
            • AND
              • commentocaml-libguestfs is earlier than 1:1.38.4-14.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345220
              • commentocaml-libguestfs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20110586008
            • AND
              • commentocaml-hivex-devel is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345222
              • commentocaml-hivex-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301012
            • AND
              • commentocaml-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345224
              • commentocaml-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301008
            • AND
              • commentsgabios is earlier than 1:0.20170427git-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345226
              • commentsgabios is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175014
            • AND
              • commentruby-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345227
              • commentruby-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301006
            • AND
              • commentpython3-libvirt is earlier than 0:4.5.0-2.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345228
              • commentpython3-libvirt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175044
            • AND
              • commentpython3-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345229
              • commentpython3-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175048
            • AND
              • commentperl-hivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345230
              • commentperl-hivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301002
            • AND
              • commentperl-Sys-Virt-debugsource is earlier than 0:4.5.0-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345231
              • commentperl-Sys-Virt-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175052
            • AND
              • commentperl-Sys-Virt is earlier than 0:4.5.0-5.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345232
              • commentperl-Sys-Virt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175054
            • AND
              • commentnetcf-libs is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345233
              • commentnetcf-libs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307002
            • AND
              • commentnetcf-devel is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345234
              • commentnetcf-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307004
            • AND
              • commentnetcf-debugsource is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345235
              • commentnetcf-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175062
            • AND
              • commentnetcf is earlier than 0:0.2.8-12.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345236
              • commentnetcf is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20151307006
            • AND
              • commentlibvirt-python-debugsource is earlier than 0:4.5.0-2.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345237
              • commentlibvirt-python-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191268088
            • AND
              • commentlibvirt-nss is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345238
              • commentlibvirt-nss is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20162577036
            • AND
              • commentlibvirt-libs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345239
              • commentlibvirt-libs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029018
            • AND
              • commentlibvirt-docs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345240
              • commentlibvirt-docs is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914028
            • AND
              • commentlibvirt-devel is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345241
              • commentlibvirt-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581004
            • AND
              • commentlibvirt-debugsource is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345242
              • commentlibvirt-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175098
            • AND
              • commentlibvirt-dbus-debugsource is earlier than 0:1.2.0-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345243
              • commentlibvirt-dbus-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175100
            • AND
              • commentlibvirt-dbus is earlier than 0:1.2.0-3.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345244
              • commentlibvirt-dbus is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175102
            • AND
              • commentlibvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345245
              • commentlibvirt-daemon-driver-storage-scsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029028
            • AND
              • commentlibvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345246
              • commentlibvirt-daemon-driver-storage-rbd is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029040
            • AND
              • commentlibvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345247
              • commentlibvirt-daemon-driver-storage-mpath is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029026
            • AND
              • commentlibvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345248
              • commentlibvirt-daemon-driver-storage-logical is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029020
            • AND
              • commentlibvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345249
              • commentlibvirt-daemon-driver-storage-iscsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029014
            • AND
              • commentlibvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345250
              • commentlibvirt-daemon-driver-storage-disk is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029008
            • AND
              • commentlibvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345251
              • commentlibvirt-daemon-driver-storage-core is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029010
            • AND
              • commentlibvirt-daemon-driver-storage is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345252
              • commentlibvirt-daemon-driver-storage is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914040
            • AND
              • commentlibvirt-daemon-driver-secret is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345253
              • commentlibvirt-daemon-driver-secret is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914024
            • AND
              • commentlibvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345254
              • commentlibvirt-daemon-driver-nwfilter is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914002
            • AND
              • commentlibvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345255
              • commentlibvirt-daemon-driver-nodedev is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914006
            • AND
              • commentlibvirt-daemon-driver-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345256
              • commentlibvirt-daemon-driver-network is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914010
            • AND
              • commentlibvirt-daemon-driver-interface is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345257
              • commentlibvirt-daemon-driver-interface is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914012
            • AND
              • commentlibvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345258
              • commentlibvirt-daemon-config-nwfilter is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914020
            • AND
              • commentlibvirt-daemon-config-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345259
              • commentlibvirt-daemon-config-network is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914026
            • AND
              • commentlibvirt-daemon is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345260
              • commentlibvirt-daemon is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20140914008
            • AND
              • commentlibvirt-client is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345261
              • commentlibvirt-client is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581008
            • AND
              • commentlibvirt-bash-completion is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345262
              • commentlibvirt-bash-completion is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20183113026
            • AND
              • commentlibvirt-admin is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345263
              • commentlibvirt-admin is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20180029056
            • AND
              • commentlibvirt is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3
                ovaloval:com.redhat.rhsa:tst:20193345264
              • commentlibvirt is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhba:tst:20131581010
            • AND
              • commentlibiscsi-utils is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345265
              • commentlibiscsi-utils is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175154
            • AND
              • commentlibiscsi-devel is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345266
              • commentlibiscsi-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175156
            • AND
              • commentlibiscsi-debugsource is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345267
              • commentlibiscsi-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175158
            • AND
              • commentlibiscsi is earlier than 0:1.18.0-8.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345268
              • commentlibiscsi is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175160
            • AND
              • commentlibguestfs-winsupport is earlier than 0:8.0-4.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345269
              • commentlibguestfs-winsupport is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175164
            • AND
              • commenthivex-devel is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345270
              • commenthivex-devel is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301010
            • AND
              • commenthivex-debugsource is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345271
              • commenthivex-debugsource is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20191175190
            • AND
              • commenthivex is earlier than 0:1.3.15-7.module+el8.1.0+4066+0f1aadab
                ovaloval:com.redhat.rhsa:tst:20193345272
              • commenthivex is signed with Red Hat redhatrelease2 key
                ovaloval:com.redhat.rhsa:tst:20150301004
    rhsa
    idRHSA-2019:3345
    released2019-11-05
    severityLow
    titleRHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)
  • rhsa
    idRHSA-2019:2425
  • rhsa
    idRHSA-2019:2553
rpms
  • qemu-guest-agent-2:0.12.1.2-2.506.el6_10.4
  • qemu-img-2:0.12.1.2-2.506.el6_10.4
  • qemu-kvm-2:0.12.1.2-2.506.el6_10.4
  • qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.4
  • qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.4
  • qemu-img-10:1.5.3-167.el7
  • qemu-kvm-10:1.5.3-167.el7
  • qemu-kvm-common-10:1.5.3-167.el7
  • qemu-kvm-debuginfo-10:1.5.3-167.el7
  • qemu-kvm-tools-10:1.5.3-167.el7
  • qemu-img-rhev-10:2.12.0-33.el7
  • qemu-kvm-common-rhev-10:2.12.0-33.el7
  • qemu-kvm-rhev-10:2.12.0-33.el7
  • qemu-kvm-rhev-debuginfo-10:2.12.0-33.el7
  • qemu-kvm-tools-rhev-10:2.12.0-33.el7
  • qemu-img-rhev-10:2.12.0-33.el7
  • qemu-kvm-common-rhev-10:2.12.0-33.el7
  • qemu-kvm-rhev-10:2.12.0-33.el7
  • qemu-kvm-rhev-debuginfo-10:2.12.0-33.el7
  • qemu-kvm-tools-rhev-10:2.12.0-33.el7
  • SLOF-0:20171214-6.gitfa98132.module+el8.1.0+4066+0f1aadab
  • hivex-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • hivex-debuginfo-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • hivex-debugsource-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • hivex-devel-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • libguestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-bash-completion-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-benchmarking-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-benchmarking-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-debugsource-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-devel-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-gfs2-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-gobject-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-gobject-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-gobject-devel-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-inspect-icons-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-java-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-java-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-java-devel-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-javadoc-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-man-pages-ja-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-man-pages-uk-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-rescue-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-rsync-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-tools-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-tools-c-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-tools-c-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libguestfs-winsupport-0:8.0-4.module+el8.1.0+4066+0f1aadab
  • libguestfs-xfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • libiscsi-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libiscsi-debuginfo-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libiscsi-debugsource-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libiscsi-devel-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libiscsi-utils-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libiscsi-utils-debuginfo-0:1.18.0-8.module+el8.1.0+4066+0f1aadab
  • libvirt-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-admin-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-admin-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-bash-completion-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-client-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-client-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-config-network-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-config-nwfilter-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-interface-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-interface-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-network-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-network-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-nodedev-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-nodedev-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-nwfilter-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-nwfilter-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-qemu-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-qemu-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-secret-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-secret-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-core-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-core-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-disk-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-disk-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-gluster-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-gluster-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-iscsi-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-iscsi-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-logical-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-logical-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-mpath-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-mpath-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-rbd-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-rbd-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-scsi-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-driver-storage-scsi-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-daemon-kvm-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-dbus-0:1.2.0-3.module+el8.1.0+4066+0f1aadab
  • libvirt-dbus-debuginfo-0:1.2.0-3.module+el8.1.0+4066+0f1aadab
  • libvirt-dbus-debugsource-0:1.2.0-3.module+el8.1.0+4066+0f1aadab
  • libvirt-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-debugsource-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-devel-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-docs-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-libs-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-libs-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-lock-sanlock-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-lock-sanlock-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-nss-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-nss-debuginfo-0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • libvirt-python-debugsource-0:4.5.0-2.module+el8.1.0+4066+0f1aadab
  • lua-guestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • lua-guestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • nbdkit-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-bash-completion-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-basic-plugins-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-basic-plugins-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-debugsource-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-devel-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-example-plugins-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-example-plugins-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-gzip-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-gzip-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-python-common-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-python3-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-python3-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-vddk-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-vddk-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-xz-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • nbdkit-plugin-xz-debuginfo-0:1.4.2-5.module+el8.1.0+4066+0f1aadab
  • netcf-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • netcf-debuginfo-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • netcf-debugsource-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • netcf-devel-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • netcf-libs-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • netcf-libs-debuginfo-0:0.2.8-12.module+el8.1.0+4066+0f1aadab
  • ocaml-hivex-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • ocaml-hivex-debuginfo-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • ocaml-hivex-devel-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • ocaml-libguestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • ocaml-libguestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • ocaml-libguestfs-devel-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • perl-Sys-Guestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • perl-Sys-Guestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • perl-Sys-Virt-0:4.5.0-5.module+el8.1.0+4066+0f1aadab
  • perl-Sys-Virt-debuginfo-0:4.5.0-5.module+el8.1.0+4066+0f1aadab
  • perl-Sys-Virt-debugsource-0:4.5.0-5.module+el8.1.0+4066+0f1aadab
  • perl-hivex-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • perl-hivex-debuginfo-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • python3-hivex-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • python3-hivex-debuginfo-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • python3-libguestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • python3-libguestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • python3-libvirt-0:4.5.0-2.module+el8.1.0+4066+0f1aadab
  • python3-libvirt-debuginfo-0:4.5.0-2.module+el8.1.0+4066+0f1aadab
  • qemu-guest-agent-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-guest-agent-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-img-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-img-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-curl-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-curl-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-gluster-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-gluster-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-iscsi-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-iscsi-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-rbd-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-rbd-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-ssh-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-block-ssh-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-common-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-common-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-core-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-core-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-debugsource-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-tests-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • qemu-kvm-tests-debuginfo-15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • ruby-hivex-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • ruby-hivex-debuginfo-0:1.3.15-7.module+el8.1.0+4066+0f1aadab
  • ruby-libguestfs-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • ruby-libguestfs-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • seabios-0:1.11.1-4.module+el8.1.0+4066+0f1aadab
  • seabios-bin-0:1.11.1-4.module+el8.1.0+4066+0f1aadab
  • seavgabios-bin-0:1.11.1-4.module+el8.1.0+4066+0f1aadab
  • sgabios-1:0.20170427git-3.module+el8.1.0+4066+0f1aadab
  • sgabios-bin-1:0.20170427git-3.module+el8.1.0+4066+0f1aadab
  • supermin-0:5.1.19-9.module+el8.1.0+4066+0f1aadab
  • supermin-debuginfo-0:5.1.19-9.module+el8.1.0+4066+0f1aadab
  • supermin-debugsource-0:5.1.19-9.module+el8.1.0+4066+0f1aadab
  • supermin-devel-0:5.1.19-9.module+el8.1.0+4066+0f1aadab
  • virt-dib-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • virt-dib-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • virt-p2v-maker-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • virt-v2v-1:1.38.4-14.module+el8.1.0+4066+0f1aadab
  • virt-v2v-debuginfo-1:1.38.4-14.module+el8.1.0+4066+0f1aadab