{"id":"MGASA-2019-0390","summary":"Updated libvirt packages fix security vulnerabilities","details":"Updated libvirt packages fix security vulnerabilities:\n\nAn information leak which allowed to retrieve the guest hostname\nunder readonly mode (CVE-2019-3886).\n\nWrong permissions in systemd admin-sock due to missing SocketMode\nparameter (CVE-2019-10132).\n\nArbitrary file read/exec via virDomainSaveImageGetXMLDesc API\n(CVE-2019-10161).\n\nvirDomainManagedSaveDefineXML API exposed to readonly clients\n(CVE-2019-10166).\n\nArbitrary command execution via virConnectGetDomainCapabilities API\n(CVE-2019-10167).\n\nArbitrary command execution via virConnectBaselineHypervisorCPU and\nvirConnectCompareHypervisorCPU APIs (CVE-2019-10168).\n\nAlso, this update contains the libvirt adjustments, that pass through\nthe new 'md-clear' CPU flag, to help address Intel CPU speculative\nexecution flaws.\n","modified":"2026-01-31T11:29:47.484921Z","published":"2019-12-15T18:03:05Z","related":["CVE-2019-10132","CVE-2019-10161","CVE-2019-10166","CVE-2019-10167","CVE-2019-10168","CVE-2019-3886"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0390.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=24757"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2019-04/msg00207.html"},{"type":"REPORT","url":"https://access.redhat.com/errata/RHSA-2019:1264"},{"type":"REPORT","url":"https://access.redhat.com/errata/RHSA-2019:1579"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2019-06/msg00023.html"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libvirt?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0390.json"}},{"package":{"name":"python-libvirt","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/python-libvirt?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0390.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}