Vulnerability Description
libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Libvirt | < 1.3.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff58PatchThird Party Advisory
- https://github.com/libvirt/libvirt/compare/11288f5...8fd6867PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/04/msg00032.htmlMailing ListThird Party Advisory
- https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff58PatchThird Party Advisory
- https://github.com/libvirt/libvirt/compare/11288f5...8fd6867PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/04/msg00032.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2016-10746?
CVE-2016-10746 is a vulnerability with a CVSS score of 7.5 (HIGH). libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability ...
How severe is CVE-2016-10746?
CVE-2016-10746 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10746?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Libvirt, Debian Debian Linux.