CVE-2020-15708
Published: 04 August 2020
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Priority
CVSS 3 base score: 7.8
Status
Package | Release | Status |
---|---|---|
libvirt Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(6.0.0-0ubuntu11)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(6.0.0-0ubuntu8.3)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(code not present)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
Notes
Author | Note |
---|---|
mdeslaur | This is ZDI-CAN-11561. caused by the switch to systemd socket activation, so bionic and earlier are not affected |