CVE-2019-10168

Name
CVE-2019-10168
Description
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://access.redhat.com/libvirt-privesc-vulnerabilities
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10168
Third Party Advisory https://security.gentoo.org/glsa/202003-18

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* libvirt >= 5.0.0 < 5.4.1
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* libvirt >= 4.0.0 < 4.10.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status