CVE-2020-14339
HIGH
8,8
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high
HIGH
7,2
Source: [email protected]
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0008
Percentile
0,2th
Updated
EPSS Score Trend (Last 91 Days)
772
Missing Release of Resource after Effective Lifetime
DraftCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Other)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Cpu)
Applicable Platforms
Technologies:
Mobile
Operating System
Enterprise Linux by Redhat
CPE Identifier
View Detailed Analysis
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Libvirt by Redhat
Version Range Affected
From
6.2.0
(inclusive)
To
6.7.0
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugzilla.redhat.com/show_bug.cgi?id=1860069
https://security.gentoo.org/glsa/202101-22
https://security.gentoo.org/glsa/202210-06
https://bugzilla.redhat.com/show_bug.cgi?id=1860069
https://security.gentoo.org/glsa/202101-22
https://security.gentoo.org/glsa/202210-06