libvirt.so is vulnerable to privilege escalation. The vulnerability is possible because failure to check connect:write permission
in the virConnectDomainXMLToNative
function provides the attacker domain:write
privileges to execute Qemu binaries through malicious XML.
libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=57687fd6bf7f6e1b3662c52f3f26c06ab19dc96c
libvirt.org/git/?p=libvirt.git;a=commit;h=57687fd6bf7f6e1b3662c52f3f26c06ab19dc96c
secunia.com/advisories/55210
secunia.com/advisories/60895
security.gentoo.org/glsa/glsa-201412-04.xml
wiki.libvirt.org/page/Maintenance_Releases
www.securitytracker.com/id/1029241
www.ubuntu.com/usn/USN-2026-1
bugzilla.redhat.com/show_bug.cgi?id=1015259
libvirt.org/git/?p=libvirt.git;a=blobdiff;f=src/libvirt.c;h=7fa675ac96b2f093f20172ab3b880906ca2effc8;hp=9f579a604db3f19d8ca1e7f0f47c68f700fd2f83;hb=57687fd6bf7f6e1b3662c52f3f26c06ab19dc96c;hpb=8d35f9dbad66984564cfd2b84f91568253da6a7a