A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://security.libvirt.org/2019/0003.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10132 | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2019:1264 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:1268 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RANC4LWZQRVJGJHVWCU6R4CCXQMDD4L/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:1455 | vendor advisory |
https://usn.ubuntu.com/4021-1/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/ | vendor advisory |