Описание
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libvirt | not-affected | package |
Примечания
https://bugzilla.redhat.com/show_bug.cgi?id=1866270#c2
Debian used to use polkit in 1.2.9-rc1-1 and only later on
enabled as well libvirtd socket activation. Ubuntu OTOH continued
to ship the Allow-libvirt-group-to-access-the-socket.patch patch
which caused the CVE-2020-15708 issue.
Upstream improved documentation in with:
https://www.redhat.com/archives/libvir-list/2020-August/msg00360.html
Связанные уязвимости
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии