Amazon Linux 2 : libvirt (ALAS-2019-1274) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)

high Nessus Plugin ID 128288
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Amazon Linux 2 host is missing a security update.


Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

The virConnectGetDomainCapabilities() libvirt API accepts an 'emulatorbin' argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. (CVE-2019-10167)

It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed. (CVE-2019-10166)

A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.(CVE-2019-10132)

The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an 'emulator' argument to specify the program providing emulation for a domain.
Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. (CVE-2019-10168)

It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process.
An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs. (CVE-2019-10161)

Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127)

A flaw was found in the implementation of the 'fill buffer', a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)


Run 'yum update libvirt' to update your system.

See Also

Plugin Details

Severity: High

ID: 128288

File Name: al2_ALAS-2019-1274.nasl

Version: 1.2

Type: local

Agent: unix

Published: 8/28/2019

Updated: 12/31/2019

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2019-10161


Risk Factor: High

Score: 8.1


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:libvirt, p-cpe:/a:amazon:linux:libvirt-admin, p-cpe:/a:amazon:linux:libvirt-bash-completion, p-cpe:/a:amazon:linux:libvirt-client, p-cpe:/a:amazon:linux:libvirt-daemon, p-cpe:/a:amazon:linux:libvirt-daemon-config-network, p-cpe:/a:amazon:linux:libvirt-daemon-config-nwfilter, p-cpe:/a:amazon:linux:libvirt-daemon-driver-interface, p-cpe:/a:amazon:linux:libvirt-daemon-driver-lxc, p-cpe:/a:amazon:linux:libvirt-daemon-driver-network, p-cpe:/a:amazon:linux:libvirt-daemon-driver-nodedev, p-cpe:/a:amazon:linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:amazon:linux:libvirt-daemon-driver-qemu, p-cpe:/a:amazon:linux:libvirt-daemon-driver-secret, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-core, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:amazon:linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:amazon:linux:libvirt-daemon-kvm, p-cpe:/a:amazon:linux:libvirt-daemon-lxc, p-cpe:/a:amazon:linux:libvirt-debuginfo, p-cpe:/a:amazon:linux:libvirt-devel, p-cpe:/a:amazon:linux:libvirt-docs, p-cpe:/a:amazon:linux:libvirt-libs, p-cpe:/a:amazon:linux:libvirt-lock-sanlock, p-cpe:/a:amazon:linux:libvirt-login-shell, p-cpe:/a:amazon:linux:libvirt-nss, cpe:/o:amazon:linux:2

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/27/2019

Vulnerability Publication Date: 5/22/2019

Reference Information

CVE: CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-10132, CVE-2019-10161, CVE-2019-10166, CVE-2019-10167, CVE-2019-10168, CVE-2019-11091

ALAS: 2019-1274