CVE-2019-10168

Published: 20 June 2019

The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
libvirt
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(code not present)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)
Patches:
Upstream: https://libvirt.org/git/?p=libvirt.git;a=commit;h=bf6c2830b6c338b1f5699b095df36f374777b291 (5.4)
Upstream: http://libvirt.org/git/?p=libvirt.git;a=commit;h=1ef98539a655109480628c91feac48c3c69675ef (5.0)
Upstream: http://libvirt.org/git/?p=libvirt.git;a=commit;h=890965e8943a8837b41c3c6f366135ccfef48fb3 (4.6)