vulnerability
Huawei EulerOS: CVE-2018-6764: libvirt security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | 02/23/2018 | 04/03/2019 | 11/27/2024 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
02/23/2018
Added
04/03/2019
Modified
11/27/2024
Description
util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.
Solution(s)
huawei-euleros-2_0_sp5-upgrade-libvirthuawei-euleros-2_0_sp5-upgrade-libvirt-clienthuawei-euleros-2_0_sp5-upgrade-libvirt-daemonhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-config-networkhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-config-nwfilterhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-interfacehuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-lxchuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-networkhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-nodedevhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-nwfilterhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-qemuhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-secrethuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storagehuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-corehuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-diskhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-glusterhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-iscsihuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-logicalhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-mpathhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-rbdhuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-driver-storage-scsihuawei-euleros-2_0_sp5-upgrade-libvirt-daemon-kvmhuawei-euleros-2_0_sp5-upgrade-libvirt-libs

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.