Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35517

Опубликовано: 28 янв. 2021
Источник: debian

Описание

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:5.2+dfsg-5package
qemunot-affectedbusterpackage
qemunot-affectedstretchpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg05461.html

  • https://www.openwall.com/lists/oss-security/2021/01/22/1

Связанные уязвимости

CVSS3: 8.2
ubuntu
больше 4 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

CVSS3: 7.5
redhat
больше 4 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

CVSS3: 8.2
nvd
больше 4 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

rocky
больше 4 лет назад

Important: virt:rhel and virt-devel:rhel security update

CVSS3: 8.2
github
около 3 лет назад

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.