CVE Vulnerabilities

CVE-2020-35517

Improper Privilege Management

Published: Jan 28, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu5.0.0 (including)5.2.50 (including)
Advanced Virtualization for RHEL 8.2.1RedHatvirt:8.2-8020120210211153838.863bb0db*
Advanced Virtualization for RHEL 8.2.1RedHatvirt-devel:8.2-8020120210211153838.863bb0db*
Advanced Virtualization for RHEL 8.3.1RedHatvirt:8.3-8030120210211160750.71132145*
Advanced Virtualization for RHEL 8.3.1RedHatvirt-devel:8.3-8030120210211160750.71132145*
Red Hat Enterprise Linux 8RedHatvirt-devel:rhel-8030020210210212009.229f0a1c*
Red Hat Enterprise Linux 8RedHatvirt:rhel-8030020210210212009.229f0a1c*
QemuUbuntudevel*
QemuUbuntugroovy*
QemuUbuntuhirsute*
QemuUbuntuimpish*
QemuUbuntujammy*
QemuUbuntutrusty*

Potential Mitigations

References