First published: Fri May 03 2019(Updated: )
A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
Affected Software | Affected Version | How to fix |
---|---|---|
libvirt | >=4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1706067 is considered high due to the potential for unauthorized administrative access.
To fix REDHAT-BUG-1706067, ensure that the SocketMode configuration parameter for virtlockd-admin.socket and virtlogd-admin.socket is properly set to restrict access.
Versions of libvirt starting from 4.1.0 are affected by REDHAT-BUG-1706067.
The vulnerability affects the virtlockd-admin.socket and virtlogd-admin.socket systemd units in libvirt.
Any user on the host can exploit REDHAT-BUG-1706067 due to the missing SocketMode configuration.