Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2527

Опубликовано: 09 июл. 2011
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.

Отчет

Future qemu-kvm updates in Red Hat Enterprise Linux 6 may address this flaw. This issue did not affect the versions of qemu-kvm as shipped with Red Hat Enterprise Linux 5 as it did not include support for "run as" functionality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmNot affected
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2011:153105.12.2011

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=720773qemu: when started as root, extra groups are not dropped correctly

EPSS

Процентиль: 26%
0.00088
Низкий

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.

nvd
больше 13 лет назад

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.

debian
больше 13 лет назад

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earli ...

github
больше 3 лет назад

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.

oracle-oval
почти 14 лет назад

ELSA-2011-1531: qemu-kvm security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 26%
0.00088
Низкий

3.7 Low

CVSS2