[ASA-202009-8] libvirt: privilege escalation

Morten Linderud foxboron at archlinux.org
Tue Sep 29 16:39:47 UTC 2020


Arch Linux Security Advisory ASA-202009-8
=========================================

Severity: High
Date    : 2020-09-22
CVE-ID  : CVE-2020-14339
Package : libvirt
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-1232

Summary
=======

The package libvirt before version 6.5.0-2 is vulnerable to privilege
escalation.

Resolution
==========

Upgrade to 6.5.0-2.

# pacman -Syu "libvirt>=6.5.0-2"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

A flaw was found in libvirt, where it leaked a file descriptor for
`/dev/mapper/control` into the QEMU process. This file descriptor
allows for privileged operations to happen against the device-mapper on
the host. This flaw allows a malicious guest user or process to perform
operations outside of their standard permissions, potentially causing
serious damage to the host operating system. The highest threat from
this vulnerability is to confidentiality, integrity, as well as system
availability.

Impact
======

A local user can escalate privileges on the host operating system.

References
==========

https://bugs.archlinux.org/task/67807
https://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=22494556542c676d1b9e7f1c1f2ea13ac17e1e3e;hp=b8ebbe05451fde7ce541564f73437a29ffd5db0d
https://security.archlinux.org/CVE-2020-14339
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20200929/9f3a59d9/attachment.sig>


More information about the arch-security mailing list