Vivian Zhang and Christoph Anton Mitterer discovered that libvirt incorrectly disabled password authentication when the VNC password was set to an empty string. A remote attacker could possibly use this issue to bypass authentication, contrary to expectations. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-5008)
Daniel P. Berrange discovered that libvirt incorrectly handled validating SSL/TLS certificates. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 17.10. (CVE-2017-1000256)
Daniel P. Berrange and Peter Krempa discovered that libvirt incorrectly handled large QEMU replies. An attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2018-5748)
Pedro Sampaio discovered that libvirt incorrectly handled the libnssdns.so module. An attacker in a libvirtlxc session could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6764)
{
"binaries": [
{
"binary_name": "libvirt-bin",
"binary_version": "1.2.2-0ubuntu13.1.26"
},
{
"binary_name": "libvirt-dev",
"binary_version": "1.2.2-0ubuntu13.1.26"
},
{
"binary_name": "libvirt0",
"binary_version": "1.2.2-0ubuntu13.1.26"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2016-5008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-5748",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
}
],
"ecosystem": "Ubuntu:14.04:LTS"
}
{
"binaries": [
{
"binary_name": "libvirt-bin",
"binary_version": "1.3.1-1ubuntu10.19"
},
{
"binary_name": "libvirt-dev",
"binary_version": "1.3.1-1ubuntu10.19"
},
{
"binary_name": "libvirt0",
"binary_version": "1.3.1-1ubuntu10.19"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2016-5008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-5748",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-6764",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
}
],
"ecosystem": "Ubuntu:16.04:LTS"
}