QID 354314
Date Published: 2022-12-21
QID 354314: Amazon Linux Security Advisory for qemu : ALAS2022-2022-050
A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the linux kernel that allows local users to create files with an unintended group ownership and with group execution and sgid permission bits set, in a scenario where a directory is sgid and belongs to a certain group and is writable by a user who is not a member of this group.
This can lead to excessive permissions granted in case when they should not. (
( CVE-2018-13405) a flaw was found in the qemu virtio-fs shared file system daemon (virtiofsd) implementation.
This flaw is strictly related to( CVE-2018-13405.
A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is sgid to a certain group and is writable by a user who is not a member of the group.
This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest.
A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system. (
( CVE-2022-0358)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2022-2022-050 -
alas.aws.amazon.com/AL2022/ALAS-2022-050.html
CVEs related to QID 354314
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2022-2022-050 | amazon linux 2022 |
|