Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html | third party advisory mailing list |
https://security.gentoo.org/glsa/201706-03 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/98574 | vdb entry third party advisory |
https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html | mailing list third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1451709 | issue tracking third party advisory patch |
http://seclists.org/oss-sec/2017/q2/278 | mailing list third party advisory patch |