CVE-2011-2527

The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html
http://rhn.redhat.com/errata/RHSA-2011-1531.html
http://secunia.com/advisories/45187 Vendor Advisory
http://secunia.com/advisories/45188 Vendor Advisory
http://secunia.com/advisories/45419 Vendor Advisory
http://secunia.com/advisories/47157 Vendor Advisory
http://secunia.com/advisories/47992 Vendor Advisory
http://ubuntu.com/usn/usn-1177-1
http://www.openwall.com/lists/oss-security/2011/07/12/15
http://www.openwall.com/lists/oss-security/2011/07/12/5
http://www.osvdb.org/74752
http://www.securityfocus.com/bid/48659
https://bugs.launchpad.net/qemu/+bug/807893
https://exchange.xforce.ibmcloud.com/vulnerabilities/68539
https://www.debian.org/security/2011/dsa-2282
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html
http://rhn.redhat.com/errata/RHSA-2011-1531.html
http://secunia.com/advisories/45187 Vendor Advisory
http://secunia.com/advisories/45188 Vendor Advisory
http://secunia.com/advisories/45419 Vendor Advisory
http://secunia.com/advisories/47157 Vendor Advisory
http://secunia.com/advisories/47992 Vendor Advisory
http://ubuntu.com/usn/usn-1177-1
http://www.openwall.com/lists/oss-security/2011/07/12/15
http://www.openwall.com/lists/oss-security/2011/07/12/5
http://www.osvdb.org/74752
http://www.securityfocus.com/bid/48659
https://bugs.launchpad.net/qemu/+bug/807893
https://exchange.xforce.ibmcloud.com/vulnerabilities/68539
https://www.debian.org/security/2011/dsa-2282
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html -
References () http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html - () http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html -
References () http://rhn.redhat.com/errata/RHSA-2011-1531.html - () http://rhn.redhat.com/errata/RHSA-2011-1531.html -
References () http://secunia.com/advisories/45187 - Vendor Advisory () http://secunia.com/advisories/45187 - Vendor Advisory
References () http://secunia.com/advisories/45188 - Vendor Advisory () http://secunia.com/advisories/45188 - Vendor Advisory
References () http://secunia.com/advisories/45419 - Vendor Advisory () http://secunia.com/advisories/45419 - Vendor Advisory
References () http://secunia.com/advisories/47157 - Vendor Advisory () http://secunia.com/advisories/47157 - Vendor Advisory
References () http://secunia.com/advisories/47992 - Vendor Advisory () http://secunia.com/advisories/47992 - Vendor Advisory
References () http://ubuntu.com/usn/usn-1177-1 - () http://ubuntu.com/usn/usn-1177-1 -
References () http://www.openwall.com/lists/oss-security/2011/07/12/15 - () http://www.openwall.com/lists/oss-security/2011/07/12/15 -
References () http://www.openwall.com/lists/oss-security/2011/07/12/5 - () http://www.openwall.com/lists/oss-security/2011/07/12/5 -
References () http://www.osvdb.org/74752 - () http://www.osvdb.org/74752 -
References () http://www.securityfocus.com/bid/48659 - () http://www.securityfocus.com/bid/48659 -
References () https://bugs.launchpad.net/qemu/+bug/807893 - () https://bugs.launchpad.net/qemu/+bug/807893 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68539 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68539 -
References () https://www.debian.org/security/2011/dsa-2282 - () https://www.debian.org/security/2011/dsa-2282 -

Information

Published : 2012-06-21 15:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2527

Mitre link : CVE-2011-2527

CVE.ORG link : CVE-2011-2527


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-264

Permissions, Privileges, and Access Controls