A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1977726 | vendor advisory issue tracking |
https://gitlab.com/libvirt/libvirt/-/issues/153 | third party advisory exploit |
https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2 | third party advisory patch |
https://access.redhat.com/errata/RHSA-2021:3631 | vendor advisory |
https://security.netapp.com/advisory/ntap-20220331-0010/ | third party advisory |
https://security.gentoo.org/glsa/202210-06 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html | mailing list |