Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
References
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2017/q2/278 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/98574 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1451709 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html - Mailing List, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201706-03 - Third Party Advisory |
Information
Published : 2017-05-17 15:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7493
Mitre link : CVE-2017-7493
CVE.ORG link : CVE-2017-7493
JSON object : View
Products Affected
debian
- debian_linux
qemu
- qemu
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource