Matthias Gerstner and Ján Tomko discovered that libvirt incorrectly handled certain API calls. An attacker could possibly use this issue to check for arbitrary files, or execute arbitrary binaries. In the default installation, attackers would be isolated by the libvirt AppArmor profile.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libvirt-bin",
"binary_version": "1.3.1-1ubuntu10.27"
},
{
"binary_name": "libvirt-dev",
"binary_version": "1.3.1-1ubuntu10.27"
},
{
"binary_name": "libvirt0",
"binary_version": "1.3.1-1ubuntu10.27"
}
]
}
{
"ecosystem": "Ubuntu:16.04:LTS",
"cves": [
{
"id": "CVE-2019-10161",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2019-10167",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libnss-libvirt",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-bin",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-clients",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon-driver-storage-gluster",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon-driver-storage-rbd",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon-driver-storage-sheepdog",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon-driver-storage-zfs",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-daemon-system",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-dev",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-sanlock",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt-wireshark",
"binary_version": "4.0.0-1ubuntu8.12"
},
{
"binary_name": "libvirt0",
"binary_version": "4.0.0-1ubuntu8.12"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2019-10161",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2019-10166",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2019-10167",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}