Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://security.libvirt.org/2015/0004.html | patch vendor advisory |
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7 | |
http://www.securityfocus.com/bid/90913 | vdb entry |
https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html | vendor advisory |
https://security.gentoo.org/glsa/201612-10 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2577.html | vendor advisory |