libvirt is vulnerable to privilege escalation. The vulnerability exists as it was found that several libvirt API calls did not honor the read-only permission for connections. A local attacker able to establish a read-only connection to libvirtd on a server could use this flaw to execute commands that should be restricted to read-write connections, possibly leading to a denial of service or privilege escalation.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773
libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3
libvirt.org/git/?p=libvirt.git;a=commit;h=71753cb7f7a16ff800381c0b5ee4e99eea92fed3
lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html
lists.opensuse.org/opensuse-updates/2011-04/msg00022.html
openwall.com/lists/oss-security/2011/03/09/3
openwall.com/lists/oss-security/2011/03/10/5
secunia.com/advisories/43670
secunia.com/advisories/43780
secunia.com/advisories/43897
secunia.com/advisories/43917
secunia.com/advisories/44069
www.debian.org/security/2011/dsa-2194
www.redhat.com/support/errata/RHSA-2011-0391.html
www.securityfocus.com/bid/46820
www.securitytracker.com/id?1025262
www.ubuntu.com/usn/USN-1094-1
www.vupen.com/english/advisories/2011/0694
www.vupen.com/english/advisories/2011/0700
www.vupen.com/english/advisories/2011/0794
www.vupen.com/english/advisories/2011/0805
access.redhat.com/errata/RHSA-2011:0391
access.redhat.com/security/updates/classification/#important
bugzilla.novell.com/show_bug.cgi?id=678406
bugzilla.redhat.com/show_bug.cgi?id=683650
exchange.xforce.ibmcloud.com/vulnerabilities/66012