Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7493

Опубликовано: 17 мая 2017
Источник: debian
EPSS Низкий

Описание

Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.8+dfsg-6package
qemu-kvmremovedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1451709

  • https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.

CVSS3: 7.1
redhat
около 8 лет назад

Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.

CVSS3: 7.8
nvd
около 8 лет назад

Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.

CVSS3: 7.8
github
около 3 лет назад

Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.

suse-cvrf
почти 8 лет назад

Security update for qemu

EPSS

Процентиль: 19%
0.0006
Низкий