Arch Linux 753 Published by

A libvirt security update has been released for Arch Linux.



ASA-202009-8: libvirt: privilege escalation


Arch Linux Security Advisory ASA-202009-8
========================================
Severity: High
Date : 2020-09-22
CVE-ID : CVE-2020-14339
Package : libvirt
Type : privilege escalation
Remote : No
Link :   https://security.archlinux.org/AVG-1232

Summary
======
The package libvirt before version 6.5.0-2 is vulnerable to privilege
escalation.

Resolution
=========
Upgrade to 6.5.0-2.

# pacman -Syu "libvirt>=6.5.0-2"

The problem has been fixed upstream but no release is available yet.

Workaround
=========
None.

Description
==========
A flaw was found in libvirt, where it leaked a file descriptor for
`/dev/mapper/control` into the QEMU process. This file descriptor
allows for privileged operations to happen against the device-mapper on
the host. This flaw allows a malicious guest user or process to perform
operations outside of their standard permissions, potentially causing
serious damage to the host operating system. The highest threat from
this vulnerability is to confidentiality, integrity, as well as system
availability.

Impact
=====
A local user can escalate privileges on the host operating system.

References
=========
  https://bugs.archlinux.org/task/67807