You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

63 lines
2.3 KiB

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201612-10">
<title>libvirt: Directory traversal</title>
<synopsis>Libvirt is vulnerable to directory traversal when using Access
Control Lists (ACL).
</synopsis>
<product type="ebuild">libvirt</product>
<announced>2016-12-04</announced>
<revised count="1">2016-12-04</revised>
<bug>568870</bug>
<access>local</access>
<affected>
<package name="app-emulation/libvirt" auto="yes" arch="*">
<unaffected range="ge">1.2.21-r1</unaffected>
<vulnerable range="lt">1.2.21-r1</vulnerable>
</package>
</affected>
<background>
<p>libvirt is a C toolkit for manipulating virtual machines.</p>
</background>
<description>
<p>Normally, only privileged users can coerce libvirt into creating or
opening existing files using the virStorageVol APIs; and such users
already have full privilege to create any domain XML.
</p>
<p>But in the case of fine-grained ACLs, it is feasible that a user can be
granted storage_vol:create but not domain:write, and it violates
assumptions if such a user can abuse libvirt to access files outside of
the storage pool.
</p>
</description>
<impact type="normal">
<p>When fine-grained Access Control Lists (ACL) are in effect, an
authenticated local user with storage_vol:create permission but without
domain:write permission maybe able to create or access arbitrary files
outside of the storage pool.
</p>
</impact>
<workaround>
<p>Dont make use of fine-grained Access Control Lists (ACL) in libvirt;
In Gentoo, libvirts ACL support is disable by default unless you
enable the “policykit” USE flag.
</p>
</workaround>
<resolution>
<p>All libvirt users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-emulation/libvirt-1.2.21-r1"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5313">CVE-2015-5313</uri>
</references>
<metadata tag="requester" timestamp="2015-12-24T05:15:17Z">
BlueKnight
</metadata>
<metadata tag="submitter" timestamp="2016-12-04T11:17:48Z">whissi</metadata>
</glsa>