Matthias Gerstner and Ján Tomko discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to check for arbitrary files, or execute arbitrary binaries. In the default installation, attackers would be isolated by the libvirt AppArmor profile.
{ "binaries": [ { "binary_name": "libvirt-bin", "binary_version": "1.3.1-1ubuntu10.27" }, { "binary_name": "libvirt-dev", "binary_version": "1.3.1-1ubuntu10.27" }, { "binary_name": "libvirt0", "binary_version": "1.3.1-1ubuntu10.27" } ], "availability": "No subscription required" }
{ "ecosystem": "Ubuntu:16.04:LTS", "cves": [ { "id": "CVE-2019-10161", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2019-10167", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] } ] }
{ "binaries": [ { "binary_name": "libnss-libvirt", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-bin", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-clients", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon-driver-storage-gluster", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon-driver-storage-rbd", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon-driver-storage-sheepdog", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon-driver-storage-zfs", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-daemon-system", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-dev", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-sanlock", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt-wireshark", "binary_version": "4.0.0-1ubuntu8.12" }, { "binary_name": "libvirt0", "binary_version": "4.0.0-1ubuntu8.12" } ], "availability": "No subscription required" }
{ "ecosystem": "Ubuntu:18.04:LTS", "cves": [ { "id": "CVE-2019-10161", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2019-10166", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2019-10167", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] } ] }