• 公告ID (KylinSec-SA-2022-1826)

摘要:

It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.

安全等级: Low

公告ID: KylinSec-SA-2022-1826

发布日期: 2022年8月5日

关联CVE: CVE-2019-10161  

  • 详细介绍

1. 漏洞描述

   

It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2019-10161 KY3.4-4A libvirt Unaffected
CVE-2019-10161 KY3.4-5 libvirt Unaffected
CVE-2019-10161 KY3.5.1 libvirt Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1825 下一篇:KylinSec-SA-2022-1827