Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:0886

Опубликовано: 15 мар. 2022
Источник: rocky
Оценка: Moderate

Описание

Moderate: virt:rhel and virt-devel:rhel security update

Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

  • QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libiscsix86_648.module+el8.7.0+1084+97b81f61libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libiscsi-develx86_648.module+el8.7.0+1084+97b81f61libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libiscsi-utilsx86_648.module+el8.7.0+1084+97b81f61libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm
libvirt-dbusx86_642.module+el8.7.0+1084+97b81f61libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcfx86_6412.module+el8.7.0+1084+97b81f61netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcf-develx86_6412.module+el8.7.0+1084+97b81f61netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm
netcf-libsx86_6412.module+el8.7.0+1084+97b81f61netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.

CVSS3: 7
redhat
больше 3 лет назад

A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.

CVSS3: 7.8
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

A flaw was found in the QEMU virtio-fs shared file system daemon (virt ...