Lucene search

K
archlinuxArchLinuxASA-202009-8
HistorySep 22, 2020 - 12:00 a.m.

[ASA-202009-8] libvirt: privilege escalation

2020-09-2200:00:00
security.archlinux.org
34

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.6%

Arch Linux Security Advisory ASA-202009-8

Severity: High
Date : 2020-09-22
CVE-ID : CVE-2020-14339
Package : libvirt
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-1232

Summary

The package libvirt before version 6.5.0-2 is vulnerable to privilege
escalation.

Resolution

Upgrade to 6.5.0-2.

pacman -Syu “libvirt>=6.5.0-2”

The problem has been fixed upstream but no release is available yet.

Workaround

None.

Description

A flaw was found in libvirt, where it leaked a file descriptor for
/dev/mapper/control into the QEMU process. This file descriptor
allows for privileged operations to happen against the device-mapper on
the host. This flaw allows a malicious guest user or process to perform
operations outside of their standard permissions, potentially causing
serious damage to the host operating system. The highest threat from
this vulnerability is to confidentiality, integrity, as well as system
availability.

Impact

A local user can escalate privileges on the host operating system.

References

https://bugs.archlinux.org/task/67807
https://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=22494556542c676d1b9e7f1c1f2ea13ac17e1e3e;hp=b8ebbe05451fde7ce541564f73437a29ffd5db0d
https://security.archlinux.org/CVE-2020-14339

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibvirt< 6.5.0-2UNKNOWN

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.6%