{"id":"CVE-2019-10161","details":"It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.","modified":"2026-04-02T01:27:57.448947Z","published":"2019-07-30T23:15:12.120Z","related":["MGASA-2019-0390","SUSE-SU-2019:14097-1","SUSE-SU-2019:14100-1","SUSE-SU-2019:1599-1","SUSE-SU-2019:1637-1","SUSE-SU-2019:1643-1","SUSE-SU-2019:1686-1","SUSE-SU-2019:1690-1","SUSE-SU-2019:2105-1","SUSE-SU-2019:2227-1","SUSE-SU-2019:2227-2","openSUSE-SU-2019:1672-1","openSUSE-SU-2019:1753-1","openSUSE-SU-2024:11008-1"],"references":[{"type":"WEB","url":"https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=aed6a032cead4386472afb24b16196579e239580"},{"type":"ADVISORY","url":"https://access.redhat.com/libvirt-privesc-vulnerabilities"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-18"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4047-2/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10161"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvirt/libvirt","events":[{"introduced":"0"},{"last_affected":"10ff7997c510171ab231d7c4a484abc1fecf3e78"},{"introduced":"0"},{"last_affected":"501563469e67ea54be4ec1b3b84d4f0405e90ea4"},{"introduced":"0"},{"last_affected":"5f6025945bf0f98debcd4ad8cf064e9cadca1cc9"},{"introduced":"0"},{"last_affected":"9160dfbfc513fe3ce06fb1ea7161926c390ea9f7"},{"introduced":"0"},{"last_affected":"9160dfbfc513fe3ce06fb1ea7161926c390ea9f7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"4.0"},{"introduced":"0"},{"last_affected":"4.0"}]}}],"versions":["CVE-2008-5086","CVE-2010-2238","CVE-2010-2242","CVE-2011-1146","CVE-2011-1486","CVE-2011-2178","CVE-2012-3411","CVE-2012-3445","CVE-2012-4423","CVE-2013-0170","CVE-2013-1962","CVE-2013-2218","CVE-2013-2230","CVE-2013-4153","CVE-2013-4154","CVE-2013-4239","CVE-2013-4291","CVE-2013-4292","CVE-2013-4296","CVE-2013-4297","CVE-2013-4311","CVE-2013-4399","CVE-2013-4400-1","CVE-2013-4400-2","CVE-2013-4400-3","CVE-2013-4401","CVE-2013-5651","CVE-2013-6436","CVE-2013-6456","CVE-2013-6457","CVE-2013-6458-1","CVE-2013-6458-2","CVE-2013-6458-3","CVE-2013-6458-4","CVE-2013-7336","CVE-2014-0028","CVE-2014-0179","CVE-2014-1447-1","CVE-2014-1447-2","CVE-2014-3633","CVE-2014-3657","CVE-2014-7823","CVE-2014-8131","CVE-2014-8131-1","CVE-2014-8131-2","CVE-2014-8135","CVE-2014-8136","CVE-2015-0236","CVE-2015-0236-1","CVE-2015-0236-2","CVE-2015-5247-1","CVE-2015-5247-2","CVE-2015-5247-3","CVE-2015-5313","CVE-2016-5008","CVE-2017-1000256","CVE-2017-2635","CVE-2018-5748","LIBVIRT_0_0_3","LIBVIRT_0_0_4","LIBVIRT_0_0_5","LIBVIRT_0_1_0","LIBVIRT_0_1_1","LIBVIRT_0_1_10","LIBVIRT_0_1_11","LIBVIRT_0_1_3","LIBVIRT_0_1_4","LIBVIRT_0_1_6","LIBVIRT_0_1_7","LIBVIRT_0_1_8","LIBVIRT_0_1_9","LIBVIRT_0_2_0","LIBVIRT_0_2_1","LIBVIRT_0_2_2","LIBVIRT_0_3_0","LIBVIRT_0_3_1","LIBVIRT_0_3_2","LIBVIRT_0_3_3","LIBVIRT_0_4_1","LIBVIRT_0_4_2","LIBVIRT_0_4_4","LIBVIRT_0_4_6","LIBVIRT_0_5_0","LIBVIRT_0_5_1","LIBVIRT_0_6_0","LIBVIRT_0_6_1","LIBVIRT_0_6_2","LIBVIRT_0_6_3","LIBVIRT_0_6_4","LIBVIRT_0_6_5","LIBVIR_0_0_1","LIBVIR_0_0_2","LIBXEN_FIRST_COMMIT","LIVIRT_0_2_3","v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.1.0","v0.1.1","v0.1.10","v0.1.11","v0.1.3","v0.1.4","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.10.0","v0.10.0-rc0","v0.10.0-rc1","v0.10.0-rc2","v0.10.1","v0.10.2","v0.10.2-rc1","v0.10.2-rc2","v0.10.2.1","v0.10.2.2","v0.10.2.3","v0.10.2.4","v0.10.2.5","v0.10.2.6","v0.10.2.7","v0.10.2.8","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.4.1","v0.4.2","v0.4.4","v0.4.6","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.8.4","v0.8.5","v0.8.6","v0.8.7","v0.8.8","v0.9.0","v0.9.1","v0.9.10","v0.9.10-rc1","v0.9.10-rc2","v0.9.11","v0.9.11-rc1","v0.9.11-rc2","v0.9.11.1","v0.9.11.10","v0.9.11.2","v0.9.11.3","v0.9.11.4","v0.9.11.5","v0.9.11.6","v0.9.11.7","v0.9.11.8","v0.9.11.9","v0.9.12","v0.9.12-rc1","v0.9.12-rc2","v0.9.12.1","v0.9.12.2","v0.9.12.3","v0.9.13","v0.9.13-rc1","v0.9.13-rc2","v0.9.2","v0.9.3","v0.9.3-rc1","v0.9.3-rc2","v0.9.4","v0.9.4-rc1","v0.9.4-rc2","v0.9.5","v0.9.5-rc1","v0.9.5-rc2","v0.9.5-rc3","v0.9.6","v0.9.6.1","v0.9.6.2","v0.9.6.3","v0.9.6.4","v0.9.7","v0.9.7-rc1","v0.9.8","v0.9.8-rc1","v0.9.8-rc2","v0.9.9","v0.9.9-rc1","v0.9.9-rc2","v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.0-rc3","v1.0.1","v1.0.1-rc1","v1.0.1-rc2","v1.0.2","v1.0.2-rc1","v1.0.2-rc2","v1.0.3","v1.0.3-rc1","v1.0.3-rc2","v1.0.4","v1.0.4-rc1","v1.0.4-rc2","v1.0.5","v1.0.5-rc1","v1.0.5.1","v1.0.5.2","v1.0.5.3","v1.0.5.4","v1.0.5.5","v1.0.5.6","v1.0.5.7","v1.0.5.8","v1.0.5.9","v1.0.6","v1.0.6-rc1","v1.0.6-rc2","v1.1.0","v1.1.0-rc1","v1.1.0-rc2","v1.1.1","v1.1.1-rc1","v1.1.1-rc2","v1.1.2","v1.1.2-rc1","v1.1.2-rc2","v1.1.3","v1.1.3-rc1","v1.1.3-rc2","v1.1.3.1","v1.1.3.2","v1.1.3.3","v1.1.3.4","v1.1.3.5","v1.1.3.6","v1.1.3.7","v1.1.3.8","v1.1.3.9","v1.1.4","v1.1.4-rc1","v1.1.4-rc2","v1.2.0","v1.2.0-rc1","v1.2.0-rc2","v1.2.1","v1.2.1-rc1","v1.2.1-rc2","v1.2.10","v1.2.10-rc1","v1.2.10-rc2","v1.2.11","v1.2.11-rc1","v1.2.11-rc2","v1.2.12","v1.2.12-rc1","v1.2.12-rc2","v1.2.13","v1.2.13-rc1","v1.2.13-rc2","v1.2.13.1","v1.2.13.2","v1.2.14","v1.2.14-rc1","v1.2.14-rc2","v1.2.15","v1.2.15-rc1","v1.2.15-rc2","v1.2.16","v1.2.16-rc1","v1.2.16-rc2","v1.2.17","v1.2.17-rc1","v1.2.17-rc2","v1.2.18","v1.2.18-rc1","v1.2.18-rc2","v1.2.18.1","v1.2.18.2","v1.2.18.3","v1.2.18.4","v1.2.19","v1.2.19-rc1","v1.2.19-rc2","v1.2.2","v1.2.2-rc1","v1.2.2-rc2","v1.2.20","v1.2.20-rc1","v1.2.20-rc2","v1.2.21","v1.2.21-rc1","v1.2.21-rc2","v1.2.3","v1.2.3-rc1","v1.2.3-rc2","v1.2.4","v1.2.4-rc1","v1.2.4-rc2","v1.2.5","v1.2.5-rc1","v1.2.5-rc2","v1.2.6","v1.2.6-rc1","v1.2.6-rc2","v1.2.7","v1.2.7-rc1","v1.2.7-rc2","v1.2.8","v1.2.8-rc1","v1.2.8-rc2","v1.2.9","v1.2.9-rc1","v1.2.9-rc2","v1.2.9.1","v1.2.9.2","v1.2.9.3","v1.3.0","v1.3.0-rc1","v1.3.0-rc2","v1.3.1","v1.3.1-rc1","v1.3.1-rc2","v1.3.2","v1.3.2-rc1","v1.3.2-rc2","v1.3.3","v1.3.3-rc1","v1.3.3-rc2","v1.3.3.1","v1.3.3.2","v1.3.3.3","v1.3.4","v1.3.4-rc1","v1.3.4-rc2","v1.3.5","v1.3.5-rc1","v2.0.0","v2.0.0-rc1","v2.0.0-rc2","v2.1.0","v2.1.0-rc1","v2.2.0","v2.2.0-rc1","v2.2.0-rc2","v2.2.1","v2.3.0","v2.3.0-rc1","v2.3.0-rc2","v2.4.0","v2.4.0-rc1","v2.4.0-rc2","v2.5.0","v2.5.0-rc1","v2.5.0-rc2","v3.0.0","v3.0.0-rc1","v3.0.0-rc2","v3.1.0","v3.1.0-rc1","v3.1.0-rc2","v3.10.0","v3.10.0-rc1","v3.10.0-rc2","v3.2.0","v3.2.0-rc1","v3.2.0-rc2","v3.2.1","v3.3.0","v3.3.0-rc1","v3.3.0-rc2","v3.4.0","v3.4.0-rc1","v3.4.0-rc2","v3.5.0","v3.5.0-rc1","v3.5.0-rc2","v3.6.0","v3.6.0-rc1","v3.6.0-rc2","v3.7.0","v3.7.0-rc1","v3.7.0-rc2","v3.8.0","v3.8.0-rc1","v3.9.0","v3.9.0-rc1","v3.9.0-rc2","v4.0.0","v4.0.0-rc1","v4.0.0-rc2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.10.1"}]},{"events":[{"introduced":"5.0.0"},{"fixed":"5.4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10161.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}