Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35517

Опубликовано: 28 янв. 2021
Источник: debian
EPSS Низкий

Описание

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.2+dfsg-5package
qemunot-affectedbusterpackage
qemunot-affectedstretchpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg05461.html

  • https://www.openwall.com/lists/oss-security/2021/01/22/1

EPSS

Процентиль: 25%
0.00084
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 5 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

CVSS3: 7.5
redhat
почти 5 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

CVSS3: 8.2
nvd
почти 5 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

rocky
почти 5 лет назад

Important: virt:rhel and virt-devel:rhel security update

CVSS3: 8.2
github
больше 3 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

EPSS

Процентиль: 25%
0.00084
Низкий