It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-2199 It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
Ubuntu USN Ubuntu USN USN-4047-1 libvirt vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T22:10:09.965Z

Reserved: 2019-03-27T00:00:00

Link: CVE-2019-10166

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-08-02T13:15:12.107

Modified: 2024-11-21T04:18:33.663

Link: CVE-2019-10166

cve-icon Redhat

Severity : Important

Publid Date: 2019-06-20T12:00:00Z

Links: CVE-2019-10166 - Bugzilla

cve-icon OpenCVE Enrichment

No data.