Hi,
I am new to Clair and I need some help in setting up Clair.
I followed the instructions to install Clair using Docker Compose approach
from below link:
https://github.com/coreos/clair
Both, clair and postgres containers are up. But, when I connect to Clair
using localhost:6060 I get *404 page not found*
To debug this issue, I looked into the Clair logs using "docker logs <clair
container ID>" and I found below error:
pgsql: insertVulnerabilityFixedInFeature: pq: duplicate key value violates
unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
When I logged into postgres container, I found that the tables were filled
with vulnerability information.
Could some one shed some light on this issue and help me resolve the
problem?
Please find the clair log file in the attachment that contains the error
messages.
thanks
Suresh
2016-08-09 23:59:12.418645 I | pgsql: running database migrations
2016-08-09 23:59:12.486654 E | pgsql: dial tcp 172.19.0.2:5432: getsockopt:
connection refused
2016-08-09 23:59:12.486693 C | main: database: could not open database
2016-08-10 00:01:35.435655 I | pgsql: running database migrations
goose: migrating db environment '', current version: 0, target: 20151222113213
OK 20151222113213_Initial.sql
2016-08-10 00:01:35.539015 I | pgsql: database migration ran successfully
2016-08-10 00:01:35.539273 I | api: starting health API on port 6061.
2016-08-10 00:01:35.539330 I | notifier: notifier service is disabled
2016-08-10 00:01:35.539361 I | api: starting main API on port 6060.
2016-08-10 00:01:35.539414 I | updater: updater service started. lock
identifier: 385d1ce0-960f-4f68-8298-5c3109246f18
2016-08-10 00:01:35.574370 I | updater: updating vulnerabilities
2016-08-10 00:01:35.574406 I | updater: fetching vulnerability updates
2016-08-10 00:01:35.574455 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 00:01:35.574566 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 00:01:35.574820 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 00:02:10.567873 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56710
2016-08-10 00:02:17.888768 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56710
2016-08-10 00:02:19.718497 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56710
2016-08-10 00:02:53.333829 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56710
2016-08-10 00:02:56.653240 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56712
2016-08-10 00:03:01.763658 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56712
2016-08-10 00:03:02.719292 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56710
2016-08-10 00:06:37.612870 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56722
2016-08-10 00:06:37.621697 I | api: %!s(int=404) %!d(string=GET) /favicon.ico
172.19.0.1:56724
2016-08-10 00:06:42.012919 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56726
2016-08-10 00:06:45.065323 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56726
2016-08-10 00:14:17.384127 I | updater: adding metadata to vulnerabilities
2016-08-10 00:33:16.713669 E | pgsql: insertVulnerabilityFixedInFeature: pq:
duplicate key value violates unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
database.Vulnerability{Model:database.Model{ID:0}, Name:"RHSA-2009:0382",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"},
Description:"libvirt is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. libvirt also
provides tools for remotely managing virtualized systems. The libvirtd daemon
was discovered to not properly check user connection permissions before
performing certain privileged actions, such as requesting migration of an
unprivileged guest domain to another system. A local user able to establish a
read-only connection to libvirtd could use this flaw to perform actions that
should be restricted to read-write connections. (CVE-2008-5086) libvirt_proxy,
a setuid helper application allowing non-privileged users to communicate with
the hypervisor, was discovered to not properly validate user requests. Local
users could use this flaw to cause a stack-based buffer overflow in
libvirt_proxy, possibly allowing them to run arbitrary code with root
privileges. (CVE-2009-0036) All users are advised to upgrade to these updated
packages, which contain backported patches which resolve these issues. After
installing the update, libvirtd must be restarted manually (for example, by
issuing a \"service libvirtd restart\" command), and guest systems rebooted,
for this change to take effect.",
Link:"https://rhn.redhat.com/errata/RHSA-2009-0382.html", Severity:"Medium",
Metadata:database.MetadataMap(nil),
FixedIn:[]database.FeatureVersion{database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}}},
LayersIntroducingVulnerability:[]database.Layer(nil),
FixedBy:types.Version{epoch:0, version:"", revision:""}}
2016-08-10 00:33:16.714328 E | updater: an error occured when inserting
vulnerabilities for update: database: an error occured when querying the backend
2016-08-10 00:33:16.717231 I | updater: updating vulnerabilities
2016-08-10 00:33:16.717270 I | updater: fetching vulnerability updates
2016-08-10 00:33:16.717305 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 00:33:16.717385 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 00:33:16.717550 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 17:56:23.628710 I | updater: adding metadata to vulnerabilities
2016-08-10 18:27:25.962585 E | pgsql: insertVulnerabilityFixedInFeature: pq:
duplicate key value violates unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
database.Vulnerability{Model:database.Model{ID:0}, Name:"RHSA-2009:0382",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"},
Description:"libvirt is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. libvirt also
provides tools for remotely managing virtualized systems. The libvirtd daemon
was discovered to not properly check user connection permissions before
performing certain privileged actions, such as requesting migration of an
unprivileged guest domain to another system. A local user able to establish a
read-only connection to libvirtd could use this flaw to perform actions that
should be restricted to read-write connections. (CVE-2008-5086) libvirt_proxy,
a setuid helper application allowing non-privileged users to communicate with
the hypervisor, was discovered to not properly validate user requests. Local
users could use this flaw to cause a stack-based buffer overflow in
libvirt_proxy, possibly allowing them to run arbitrary code with root
privileges. (CVE-2009-0036) All users are advised to upgrade to these updated
packages, which contain backported patches which resolve these issues. After
installing the update, libvirtd must be restarted manually (for example, by
issuing a \"service libvirtd restart\" command), and guest systems rebooted,
for this change to take effect.",
Link:"https://rhn.redhat.com/errata/RHSA-2009-0382.html", Severity:"Medium",
Metadata:database.MetadataMap(nil),
FixedIn:[]database.FeatureVersion{database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}}},
LayersIntroducingVulnerability:[]database.Layer(nil),
FixedBy:types.Version{epoch:0, version:"", revision:""}}
2016-08-10 18:27:25.963609 E | updater: an error occured when inserting
vulnerabilities for update: database: an error occured when querying the backend
2016-08-10 18:27:25.967308 I | updater: updating vulnerabilities
2016-08-10 18:27:25.967414 I | updater: fetching vulnerability updates
2016-08-10 18:27:25.967514 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 18:27:25.967796 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 18:27:25.968318 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 18:34:02.608002 I | updater: adding metadata to vulnerabilities
2016-08-10 18:35:00.642485 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56796
2016-08-10 18:35:07.739050 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56798
2016-08-10 18:36:28.891104 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56804
2016-08-10 18:36:30.194813 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56806
2016-08-10 19:08:11.701330 E | pgsql: insertVulnerabilityFixedInFeature: pq:
duplicate key value violates unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
database.Vulnerability{Model:database.Model{ID:0}, Name:"RHSA-2009:0382",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"},
Description:"libvirt is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. libvirt also
provides tools for remotely managing virtualized systems. The libvirtd daemon
was discovered to not properly check user connection permissions before
performing certain privileged actions, such as requesting migration of an
unprivileged guest domain to another system. A local user able to establish a
read-only connection to libvirtd could use this flaw to perform actions that
should be restricted to read-write connections. (CVE-2008-5086) libvirt_proxy,
a setuid helper application allowing non-privileged users to communicate with
the hypervisor, was discovered to not properly validate user requests. Local
users could use this flaw to cause a stack-based buffer overflow in
libvirt_proxy, possibly allowing them to run arbitrary code with root
privileges. (CVE-2009-0036) All users are advised to upgrade to these updated
packages, which contain backported patches which resolve these issues. After
installing the update, libvirtd must be restarted manually (for example, by
issuing a \"service libvirtd restart\" command), and guest systems rebooted,
for this change to take effect.",
Link:"https://rhn.redhat.com/errata/RHSA-2009-0382.html", Severity:"Medium",
Metadata:database.MetadataMap(nil),
FixedIn:[]database.FeatureVersion{database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}}},
LayersIntroducingVulnerability:[]database.Layer(nil),
FixedBy:types.Version{epoch:0, version:"", revision:""}}
2016-08-10 19:08:11.702349 E | updater: an error occured when inserting
vulnerabilities for update: database: an error occured when querying the backend
2016-08-10 19:08:11.709943 I | updater: updating vulnerabilities
2016-08-10 19:08:11.710052 I | updater: fetching vulnerability updates
2016-08-10 19:08:11.710139 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 19:08:11.710321 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 19:08:11.710412 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 19:15:51.393167 I | updater: adding metadata to vulnerabilities
2016-08-10 20:48:37.231467 E | pgsql: insertVulnerabilityFixedInFeature: pq:
duplicate key value violates unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
database.Vulnerability{Model:database.Model{ID:0}, Name:"RHSA-2009:0382",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"},
Description:"libvirt is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. libvirt also
provides tools for remotely managing virtualized systems. The libvirtd daemon
was discovered to not properly check user connection permissions before
performing certain privileged actions, such as requesting migration of an
unprivileged guest domain to another system. A local user able to establish a
read-only connection to libvirtd could use this flaw to perform actions that
should be restricted to read-write connections. (CVE-2008-5086) libvirt_proxy,
a setuid helper application allowing non-privileged users to communicate with
the hypervisor, was discovered to not properly validate user requests. Local
users could use this flaw to cause a stack-based buffer overflow in
libvirt_proxy, possibly allowing them to run arbitrary code with root
privileges. (CVE-2009-0036) All users are advised to upgrade to these updated
packages, which contain backported patches which resolve these issues. After
installing the update, libvirtd must be restarted manually (for example, by
issuing a \"service libvirtd restart\" command), and guest systems rebooted,
for this change to take effect.",
Link:"https://rhn.redhat.com/errata/RHSA-2009-0382.html", Severity:"Medium",
Metadata:database.MetadataMap(nil),
FixedIn:[]database.FeatureVersion{database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}}},
LayersIntroducingVulnerability:[]database.Layer(nil),
FixedBy:types.Version{epoch:0, version:"", revision:""}}
2016-08-10 20:48:37.233480 E | updater: an error occured when inserting
vulnerabilities for update: database: an error occured when querying the backend
2016-08-10 20:48:37.237136 I | updater: updating vulnerabilities
2016-08-10 20:48:37.237459 I | updater: fetching vulnerability updates
2016-08-10 20:48:37.237677 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 20:48:37.237924 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 20:48:37.238239 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 20:56:43.585300 I | updater: adding metadata to vulnerabilities
2016-08-10 22:17:03.326267 E | pgsql: insertVulnerabilityFixedInFeature: pq:
duplicate key value violates unique constraint
"vulnerability_fixedin_feature_vulnerability_id_feature_id_key"
database.Vulnerability{Model:database.Model{ID:0}, Name:"RHSA-2009:0382",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"},
Description:"libvirt is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. libvirt also
provides tools for remotely managing virtualized systems. The libvirtd daemon
was discovered to not properly check user connection permissions before
performing certain privileged actions, such as requesting migration of an
unprivileged guest domain to another system. A local user able to establish a
read-only connection to libvirtd could use this flaw to perform actions that
should be restricted to read-write connections. (CVE-2008-5086) libvirt_proxy,
a setuid helper application allowing non-privileged users to communicate with
the hypervisor, was discovered to not properly validate user requests. Local
users could use this flaw to cause a stack-based buffer overflow in
libvirt_proxy, possibly allowing them to run arbitrary code with root
privileges. (CVE-2009-0036) All users are advised to upgrade to these updated
packages, which contain backported patches which resolve these issues. After
installing the update, libvirtd must be restarted manually (for example, by
issuing a \"service libvirtd restart\" command), and guest systems rebooted,
for this change to take effect.",
Link:"https://rhn.redhat.com/errata/RHSA-2009-0382.html", Severity:"Medium",
Metadata:database.MetadataMap(nil),
FixedIn:[]database.FeatureVersion{database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-devel",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}},
database.FeatureVersion{Model:database.Model{ID:0},
Feature:database.Feature{Model:database.Model{ID:0}, Name:"libvirt-python",
Namespace:database.Namespace{Model:database.Model{ID:0}, Name:"centos:5"}},
Version:types.Version{epoch:0, version:"0.3.3", revision:"14.el5_3.1"},
AffectedBy:[]database.Vulnerability(nil),
AddedBy:database.Layer{Model:database.Model{ID:0}, Name:"", EngineVersion:0,
Parent:(*database.Layer)(nil), Namespace:(*database.Namespace)(nil),
Features:[]database.FeatureVersion(nil)}}},
LayersIntroducingVulnerability:[]database.Layer(nil),
FixedBy:types.Version{epoch:0, version:"", revision:""}}
2016-08-10 22:17:03.327342 E | updater: an error occured when inserting
vulnerabilities for update: database: an error occured when querying the backend
2016-08-10 22:17:03.330562 I | updater: updating vulnerabilities
2016-08-10 22:17:03.330689 I | updater: fetching vulnerability updates
2016-08-10 22:17:03.330889 I | updater/fetchers/ubuntu: fetching Ubuntu
vulnerabilities
2016-08-10 22:17:03.331055 I | updater/fetchers/rhel: fetching Red Hat
vulnerabilities
2016-08-10 22:17:03.331361 I | updater/fetchers/debian: fetching Debian
vulnerabilities
2016-08-10 22:24:48.029033 I | updater: adding metadata to vulnerabilities
2016-08-10 22:30:50.238341 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56850
2016-08-10 22:46:47.377503 I | api: %!s(int=404) %!d(string=GET) /
172.19.0.1:56852