Package        : libvirt
Version        : 1.2.9-9+deb8u7
CVE IDs        : CVE-2019-10161 CVE-2019-10167

Two vulnerabilities were discovered in libvirt, an abstraction API
for different underlying virtualisation mechanisms provided by the
kernel, etc.

* CVE-2019-10161: Prevent an vulnerability where readonly clients
  could use the API to specify an arbitrary path which would be
  accessed with the permissions of the libvirtd process. An attacker
  with access to the libvirtd socket could use this to probe the
  existence of arbitrary files, cause a denial of service or
  otherwise cause libvirtd to execute arbitrary programs.

* CVE-2019-10167: Prevent an arbitrary code execution vulnerability
  via the API where a user-specified binary used to probe the
  domain's capabilities.  read-only clients could specify an
  arbitrary path for this argument, causing libvirtd to execute a
  crafted executable with its own privileges.

For Debian 8 "Jessie", these issues have been fixed in libvirt
version 1.2.9-9+deb8u7.

We recommend that you upgrade your libvirt packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-1832-1: libvirt security update

June 24, 2019
Two vulnerabilities were discovered in libvirt, an abstraction API for different underlying virtualisation mechanisms provided by the kernel, etc

Summary

* CVE-2019-10167: Prevent an arbitrary code execution vulnerability
via the API where a user-specified binary used to probe the
domain's capabilities. read-only clients could specify an
arbitrary path for this argument, causing libvirtd to execute a
crafted executable with its own privileges.

For Debian 8 "Jessie", these issues have been fixed in libvirt
version 1.2.9-9+deb8u7.

We recommend that you upgrade your libvirt packages.


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : libvirt
Version : 1.2.9-9+deb8u7

Related News