QID 354314

Date Published: 2022-12-21

QID 354314: Amazon Linux Security Advisory for qemu : ALAS2022-2022-050

A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the linux kernel that allows local users to create files with an unintended group ownership and with group execution and sgid permission bits set, in a scenario where a directory is sgid and belongs to a certain group and is writable by a user who is not a member of this group.
This can lead to excessive permissions granted in case when they should not. (
( CVE-2018-13405) a flaw was found in the qemu virtio-fs shared file system daemon (virtiofsd) implementation.
This flaw is strictly related to( CVE-2018-13405.
A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is sgid to a certain group and is writable by a user who is not a member of the group.
This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest.
A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system. (
( CVE-2022-0358)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 4.6 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-050 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354314

    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-050 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-050.html