{"id":"UBUNTU-CVE-2019-10161","details":"It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.","modified":"2026-02-04T04:39:24.059278Z","published":"2019-06-20T00:00:00Z","related":["USN-4047-1","USN-4047-2"],"upstream":["CVE-2019-10161"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10161"},{"type":"REPORT","url":"https://rhn.redhat.com/errata/RHSA-2019-1578.html"},{"type":"REPORT","url":"https://access.redhat.com/libvirt-privesc-vulnerabilities"},{"type":"REPORT","url":"https://security.libvirt.org/2019/0004.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4047-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4047-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-10161"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.2.2-0ubuntu13.1.28+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.2-0ubuntu13.1.28+esm1"}]}],"versions":["1.1.1-0ubuntu8","1.1.1-0ubuntu9","1.1.4-0ubuntu2","1.1.4-0ubuntu3","1.1.4-0ubuntu4","1.1.4-0ubuntu5","1.2.0-0ubuntu1","1.2.0-0ubuntu2","1.2.0-0ubuntu3","1.2.1-0ubuntu1","1.2.1-0ubuntu2","1.2.1-0ubuntu3","1.2.1-0ubuntu4","1.2.1-0ubuntu5","1.2.1-0ubuntu7","1.2.1-0ubuntu8","1.2.1-0ubuntu9","1.2.1-0ubuntu10","1.2.2-0ubuntu1","1.2.2-0ubuntu2","1.2.2-0ubuntu3","1.2.2-0ubuntu4","1.2.2-0ubuntu5","1.2.2-0ubuntu6","1.2.2-0ubuntu7","1.2.2-0ubuntu8","1.2.2-0ubuntu9","1.2.2-0ubuntu10","1.2.2-0ubuntu11","1.2.2-0ubuntu12","1.2.2-0ubuntu13","1.2.2-0ubuntu13.1","1.2.2-0ubuntu13.1.1","1.2.2-0ubuntu13.1.2","1.2.2-0ubuntu13.1.4","1.2.2-0ubuntu13.1.5","1.2.2-0ubuntu13.1.6","1.2.2-0ubuntu13.1.7","1.2.2-0ubuntu13.1.8","1.2.2-0ubuntu13.1.9","1.2.2-0ubuntu13.1.10","1.2.2-0ubuntu13.1.12","1.2.2-0ubuntu13.1.14","1.2.2-0ubuntu13.1.16","1.2.2-0ubuntu13.1.17","1.2.2-0ubuntu13.1.20","1.2.2-0ubuntu13.1.21","1.2.2-0ubuntu13.1.22","1.2.2-0ubuntu13.1.23","1.2.2-0ubuntu13.1.25","1.2.2-0ubuntu13.1.26","1.2.2-0ubuntu13.1.27","1.2.2-0ubuntu13.1.28"],"ecosystem_specific":{"binaries":[{"binary_version":"1.2.2-0ubuntu13.1.28+esm1","binary_name":"libvirt-bin"},{"binary_version":"1.2.2-0ubuntu13.1.28+esm1","binary_name":"libvirt-dev"},{"binary_version":"1.2.2-0ubuntu13.1.28+esm1","binary_name":"libvirt0"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-10161.json"}},{"package":{"name":"libvirt","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.3.1-1ubuntu10.27?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.1-1ubuntu10.27"}]}],"versions":["1.2.16-2ubuntu11","1.2.16-2ubuntu12","1.2.16-2ubuntu13","1.2.16-2ubuntu14","1.2.21-2ubuntu1","1.2.21-2ubuntu3","1.2.21-2ubuntu4","1.2.21-2ubuntu5","1.2.21-2ubuntu7","1.2.21-2ubuntu8","1.2.21-2ubuntu9","1.2.21-2ubuntu10","1.3.1-1ubuntu1","1.3.1-1ubuntu2","1.3.1-1ubuntu3","1.3.1-1ubuntu4","1.3.1-1ubuntu6","1.3.1-1ubuntu9","1.3.1-1ubuntu10","1.3.1-1ubuntu10.1","1.3.1-1ubuntu10.2","1.3.1-1ubuntu10.3","1.3.1-1ubuntu10.5","1.3.1-1ubuntu10.6","1.3.1-1ubuntu10.7","1.3.1-1ubuntu10.8","1.3.1-1ubuntu10.10","1.3.1-1ubuntu10.11","1.3.1-1ubuntu10.12","1.3.1-1ubuntu10.13","1.3.1-1ubuntu10.14","1.3.1-1ubuntu10.15","1.3.1-1ubuntu10.17","1.3.1-1ubuntu10.18","1.3.1-1ubuntu10.19","1.3.1-1ubuntu10.21","1.3.1-1ubuntu10.22","1.3.1-1ubuntu10.23","1.3.1-1ubuntu10.24","1.3.1-1ubuntu10.25","1.3.1-1ubuntu10.26"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.1-1ubuntu10.27","binary_name":"libvirt-bin"},{"binary_version":"1.3.1-1ubuntu10.27","binary_name":"libvirt-dev"},{"binary_version":"1.3.1-1ubuntu10.27","binary_name":"libvirt0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-10161.json"}},{"package":{"name":"libvirt","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libvirt@4.0.0-1ubuntu8.12?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.0-1ubuntu8.12"}]}],"versions":["3.6.0-1ubuntu5","3.6.0-1ubuntu6","4.0.0-1ubuntu1","4.0.0-1ubuntu2","4.0.0-1ubuntu3","4.0.0-1ubuntu4","4.0.0-1ubuntu5","4.0.0-1ubuntu6","4.0.0-1ubuntu7","4.0.0-1ubuntu8","4.0.0-1ubuntu8.1","4.0.0-1ubuntu8.2","4.0.0-1ubuntu8.3","4.0.0-1ubuntu8.4","4.0.0-1ubuntu8.5","4.0.0-1ubuntu8.6","4.0.0-1ubuntu8.7","4.0.0-1ubuntu8.8","4.0.0-1ubuntu8.9","4.0.0-1ubuntu8.10","4.0.0-1ubuntu8.11"],"ecosystem_specific":{"binaries":[{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libnss-libvirt"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-bin"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-clients"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon-driver-storage-gluster"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon-driver-storage-rbd"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon-driver-storage-sheepdog"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon-driver-storage-zfs"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-daemon-system"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-dev"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-sanlock"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt-wireshark"},{"binary_version":"4.0.0-1ubuntu8.12","binary_name":"libvirt0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-10161.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}