First published: Mon Jul 09 2018(Updated: )
Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
QEMU KVM | =2.9.0-rc0 | |
QEMU KVM | =2.9.0-rc1 | |
QEMU KVM | =2.9.0-rc2 | |
QEMU KVM | =2.9.0-rc3 | |
QEMU KVM | =2.9.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7471 has been rated as a medium severity vulnerability due to its impact on host file system access.
To fix CVE-2017-7471, upgrade QEMU to version 2.9.0 or later.
Any privileged user inside a guest running affected versions of QEMU can exploit CVE-2017-7471.
The impact of CVE-2017-7471 allows a guest user to access and manipulate files on the host file system.
CVE-2017-7471 was disclosed in April 2017.