CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
72.7%
Issue Overview:
A flaw was found in the way the libvirtd daemon issued the ‘suspend’ command to a QEMU guest-agent running inside a guest, where it holds a monitor job while issuing the ‘suspend’ command to a guest-agent. A malicious guest-agent may use this flaw to block the libvirt daemon indefinitely, resulting in a denial of service. (CVE-2019-20485)
A NULL pointer dereference was found in the libvirt API responsible for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service. (CVE-2020-10703)
Affected Packages:
libvirt
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libvirt to update your system.
New Packages:
aarch64:
libvirt-4.5.0-36.amzn2.2.aarch64
libvirt-docs-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-config-network-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-config-nwfilter-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-network-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-nwfilter-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-nodedev-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-interface-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-secret-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-core-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-logical-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-disk-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-scsi-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-iscsi-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-mpath-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-storage-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-qemu-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-driver-lxc-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-kvm-4.5.0-36.amzn2.2.aarch64
libvirt-daemon-lxc-4.5.0-36.amzn2.2.aarch64
libvirt-client-4.5.0-36.amzn2.2.aarch64
libvirt-libs-4.5.0-36.amzn2.2.aarch64
libvirt-admin-4.5.0-36.amzn2.2.aarch64
libvirt-bash-completion-4.5.0-36.amzn2.2.aarch64
libvirt-login-shell-4.5.0-36.amzn2.2.aarch64
libvirt-devel-4.5.0-36.amzn2.2.aarch64
libvirt-lock-sanlock-4.5.0-36.amzn2.2.aarch64
libvirt-nss-4.5.0-36.amzn2.2.aarch64
libvirt-debuginfo-4.5.0-36.amzn2.2.aarch64
i686:
libvirt-4.5.0-36.amzn2.2.i686
libvirt-docs-4.5.0-36.amzn2.2.i686
libvirt-daemon-4.5.0-36.amzn2.2.i686
libvirt-daemon-config-network-4.5.0-36.amzn2.2.i686
libvirt-daemon-config-nwfilter-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-network-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-nwfilter-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-nodedev-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-interface-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-secret-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-core-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-logical-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-disk-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-scsi-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-iscsi-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-mpath-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-storage-4.5.0-36.amzn2.2.i686
libvirt-daemon-driver-lxc-4.5.0-36.amzn2.2.i686
libvirt-daemon-lxc-4.5.0-36.amzn2.2.i686
libvirt-client-4.5.0-36.amzn2.2.i686
libvirt-libs-4.5.0-36.amzn2.2.i686
libvirt-admin-4.5.0-36.amzn2.2.i686
libvirt-bash-completion-4.5.0-36.amzn2.2.i686
libvirt-login-shell-4.5.0-36.amzn2.2.i686
libvirt-devel-4.5.0-36.amzn2.2.i686
libvirt-nss-4.5.0-36.amzn2.2.i686
libvirt-debuginfo-4.5.0-36.amzn2.2.i686
src:
libvirt-4.5.0-36.amzn2.2.src
x86_64:
libvirt-4.5.0-36.amzn2.2.x86_64
libvirt-docs-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-config-network-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-config-nwfilter-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-network-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-nwfilter-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-nodedev-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-interface-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-secret-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-core-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-logical-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-disk-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-scsi-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-iscsi-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-mpath-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-gluster-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-rbd-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-storage-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-qemu-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-driver-lxc-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-kvm-4.5.0-36.amzn2.2.x86_64
libvirt-daemon-lxc-4.5.0-36.amzn2.2.x86_64
libvirt-client-4.5.0-36.amzn2.2.x86_64
libvirt-libs-4.5.0-36.amzn2.2.x86_64
libvirt-admin-4.5.0-36.amzn2.2.x86_64
libvirt-bash-completion-4.5.0-36.amzn2.2.x86_64
libvirt-login-shell-4.5.0-36.amzn2.2.x86_64
libvirt-devel-4.5.0-36.amzn2.2.x86_64
libvirt-lock-sanlock-4.5.0-36.amzn2.2.x86_64
libvirt-nss-4.5.0-36.amzn2.2.x86_64
libvirt-debuginfo-4.5.0-36.amzn2.2.x86_64
Red Hat: CVE-2019-20485, CVE-2020-10703
Mitre: CVE-2019-20485, CVE-2020-10703
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
72.7%