ALT-PU-2020-3005-1
Closed vulnerabilities
BDU:2020-03920
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии
Modified: 2024-09-16
BDU:2021-03736
Уязвимость демона для управления виртуализацией Libvirt, связанная с повторным освобождением памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-15708
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Modified: 2024-11-21
CVE-2020-25637
A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://security.gentoo.org/glsa/202210-06
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://security.gentoo.org/glsa/202210-06