Bug 1694880 (CVE-2019-3886)
Summary: | CVE-2019-3886 libvirt: virsh domhostname command discloses guest hostname in readonly mode | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | agedosier, berrange, bmcclain, clalancette, dfediuck, eblake, eedri, erik-fedora, itamar, jdenemar, jforbes, jsuchane, knoel, laine, libvirt-maint, marcandre.lureau, mgoldboi, michal.skrivanek, pkrempa, rbalakri, rjones, sbonazzo, security-response-team, sherold, sisharma, veillard, virt-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-25 09:52:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1695456, 1696054, 1696055 | ||
Bug Blocks: | 1694881 |
Description
Laura Pardo
2019-04-01 22:57:43 UTC
NB, the flaw isn't the fact that the guest hostname is disclosed, but rather that the act of getting the hostname involves talking to the guest agent. The guest agent is untrusted and can block libvirt operations for a period of time, and so unprivileged users must not be allowed to run operations that talk to the guest agent. Patches posted upstream at: https://www.redhat.com/archives/libvir-list/2019-April/msg00339.html NB part of the flaw was found to also affect the virDomainGetTime API, in addition to virDomainGetHostname. Thanks Daniel, I've altered the doctext to hopefully more faithfully represent the nature of the flaw, and changed the CVSS vector to A:L representing potential Availability impact by blocking libvirt. Created libvirt tracking bugs for this issue: Affects: fedora-rawhide [bug 1696055] Created mingw-libvirt tracking bugs for this issue: Affects: fedora-rawhide [bug 1696054] |