Lucene search

K
redhatcveRedhat.comRH:CVE-2019-10161
HistoryOct 11, 2019 - 5:59 p.m.

CVE-2019-10161

2019-10-1117:59:26
redhat.com
access.redhat.com
13

0.0004 Low

EPSS

Percentile

14.2%

It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.

Mitigation

The Unix permissions of libvirt's read-only socket can be made more restrictive than the default (0777) by editing /etc/libvirt/libvirtd.conf. The settings unix_sock_group = libvirt and unix_sock_ro_perms = 0770 will restrict access to only members of libvirt, who already have management access to virtual machines.