First published: Fri Jul 17 2020(Updated: )
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | >=6.2.0<6.7.0 | |
Redhat Enterprise Linux | =8.0 |
This issue is mitigated on Red Hat Enterprise Linux if SELinux is in enforcing mode, which prevents the `/dev/mapper/control` file descriptor from being accessible by a guest user/process.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14339 is a vulnerability found in libvirt where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process, allowing for privileged operations to happen against the device-mapper on the host.
CVE-2020-14339 allows a malicious guest user or process to perform operations outside of the intended scope, potentially leading to unauthorized access or other malicious activities.
The severity of CVE-2020-14339 is high, with a CVSS severity score of 8.8.
The affected versions of libvirt range from 6.2.0 up to, but not including, 6.6.0.
To fix CVE-2020-14339, it is recommended to upgrade to libvirt version 6.6.0 or later.