Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2017/q2/278 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/98574 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1451709 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html | Mailing List Third Party Advisory |
https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html | Mailing List Patch Third Party Advisory |
https://security.gentoo.org/glsa/201706-03 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-05-17 15:29
Updated : 2024-02-04 19:11
NVD link : CVE-2017-7493
Mitre link : CVE-2017-7493
CVE.ORG link : CVE-2017-7493
JSON object : View
Products Affected
qemu
- qemu
debian
- debian_linux
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource