{"id":"MGASA-2020-0473","summary":"Updated libvirt packages fix security vulnerability","details":"A double free memory issue was found to occur in the libvirt API responsible\nfor requesting information about network interfaces of a running QEMU domain.\nThis flaw affects the polkit access control driver. Specifically, clients\nconnecting to the read-write socket with limited ACL permissions could use this\nflaw to crash the libvirt daemon, resulting in a denial of service, or\npotentially escalate their privileges on the system. The highest threat from\nthis vulnerability is to data confidentiality and integrity as well as system\navailability (CVE-2020-25637).\n","modified":"2026-04-16T00:10:56.890429238Z","published":"2020-12-29T11:57:17Z","upstream":["CVE-2020-25637"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0473.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27388"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2020:5040"},{"type":"WEB","url":"https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libvirt?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.0-1.3.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0473.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}