Bug 1860069 (CVE-2020-14339) - CVE-2020-14339 libvirt: leak of /dev/mapper/control into QEMU guests
Summary: CVE-2020-14339 libvirt: leak of /dev/mapper/control into QEMU guests
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14339
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1860098 1860421 1860874 1860875 1881034 1881035 1910618
Blocks: 1859205
TreeView+ depends on / blocked
 
Reported: 2020-07-23 16:24 UTC by Mauro Matteo Cascella
Modified: 2024-03-20 10:16 UTC (History)
18 users (show)

Fixed In Version: libvirt 6.6.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Clone Of:
Environment:
Last Closed: 2020-09-01 13:17:34 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3586 0 None None None 2020-09-01 09:38:58 UTC
Red Hat Product Errata RHSA-2020:4676 0 None None None 2020-11-04 02:53:00 UTC

Description Mauro Matteo Cascella 2020-07-23 16:24:34 UTC
It was discovered that libvirt is accidentally leaking a file descriptor for /dev/mapper/control into the QEMU process. This file descriptor allows for privileged operations to be made against device mapper on the host. Thus a malicious QEMU has the potential to do serious damage to the host OS.

Upstream fix:
https://libvirt.org/git/?p=libvirt.git;a=commit;h=22494556542c676d1b9e7f1c1f2ea13ac17e1e3e

Comment 4 Mauro Matteo Cascella 2020-07-25 14:37:04 UTC
Acknowledgments:

Name: Daniel Berrange (Red Hat)

Comment 8 Mauro Matteo Cascella 2020-07-28 08:23:08 UTC
Statement:

This flaw was introduced in `libvirt` version 6.2.0. Red Hat Enterprise Linux 5, 6, 7, and 8 are not affected by this issue as they shipped an older version of the `libvirt` package which did not include the vulnerable code.

This issue affects versions of the `libvirt` package as shipped with Red Hat Enterprise Linux Advanced Virtualization 8. Future `libvirt` package updates for Red Hat Enterprise Linux Advanced Virtualization 8 may address this issue.

Comment 9 Mauro Matteo Cascella 2020-07-28 08:38:35 UTC
Mitigation:

This issue is mitigated on Red Hat Enterprise Linux if SELinux is in enforcing mode, which prevents the `/dev/mapper/control` file descriptor from being accessible by a guest user/process.

Comment 11 errata-xmlrpc 2020-09-01 09:38:54 UTC
This issue has been addressed in the following products:

  Advanced Virtualization for RHEL 8.2.1

Via RHSA-2020:3586 https://access.redhat.com/errata/RHSA-2020:3586

Comment 12 Product Security DevOps Team 2020-09-01 13:17:34 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14339

Comment 13 Mauro Matteo Cascella 2020-09-21 12:08:16 UTC
Created mingw-libvirt tracking bugs for this issue:

Affects: fedora-all [bug 1881035]

Comment 14 errata-xmlrpc 2020-11-04 02:52:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4676 https://access.redhat.com/errata/RHSA-2020:4676


Note You need to log in before you can comment on or make changes to this bug.