ghsa-c772-g5j9-w9w8
Vulnerability from github
Published
2022-05-24 17:35
Modified
2022-10-16 19:00
Severity ?
Details
A flaw was found in libvirt, where it leaked a file descriptor for /dev/mapper/control
into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{ "affected": [], "aliases": [ "CVE-2020-14339" ], "database_specific": { "cwe_ids": [ "CWE-772" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-12-03T17:15:00Z", "severity": "HIGH" }, "details": "A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "id": "GHSA-c772-g5j9-w9w8", "modified": "2022-10-16T19:00:30Z", "published": "2022-05-24T17:35:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14339" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860069" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-22" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202210-06" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.