Subject: [ASA-202009-8] libvirt: privilege escalation Arch Linux Security Advisory ASA-202009-8 ========================================= Severity: High Date : 2020-09-22 CVE-ID : CVE-2020-14339 Package : libvirt Type : privilege escalation Remote : No Link : https://security.archlinux.org/AVG-1232 Summary ======= The package libvirt before version 6.5.0-2 is vulnerable to privilege escalation. Resolution ========== Upgrade to 6.5.0-2. # pacman -Syu "libvirt>=6.5.0-2" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Impact ====== A local user can escalate privileges on the host operating system. References ========== https://bugs.archlinux.org/task/67807 https://libvirt.org/git/?p=libvirt.git;a=commitdiff;h=22494556542c676d1b9e7f1c1f2ea13ac17e1e3e;hp=b8ebbe05451fde7ce541564f73437a29ffd5db0d https://security.archlinux.org/CVE-2020-14339