Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9c6b899f7a46893ab3b671e341a2234e9c0c060e | |
https://security.gentoo.org/glsa/201706-03 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/97970 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7471 | patch third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2017/04/19/2 | patch mailing list third party advisory |