Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libnss-libvirt",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-clients",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-lxc",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-qemu",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-storage-gluster",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-storage-rbd",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-storage-zfs",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-vbox",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-driver-xen",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-system",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-system-systemd",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-daemon-system-sysv",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-dev",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-sanlock",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt-wireshark",
"binary_version": "6.0.0-0ubuntu8.3"
},
{
"binary_name": "libvirt0",
"binary_version": "6.0.0-0ubuntu8.3"
}
]
}