CVE-2023-1386
Published: 24 July 2023
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
Notes
Author | Note |
---|---|
Priority reason: Low severity issue, guest user could help host user escalate privileges |
|
mdeslaur | as of 2023-11-30, there is no upstream fix for this issue |
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
bionic |
Deferred
(2023-11-30)
|
|
focal |
Deferred
(2023-11-30)
|
|
jammy |
Deferred
(2023-11-30)
|
|
kinetic |
Ignored
(end of life, was deferred [2023-11-30])
|
|
lunar |
Deferred
(2023-11-30)
|
|
mantic |
Deferred
(2023-11-30)
|
|
trusty |
Deferred
(2023-11-30)
|
|
xenial |
Deferred
(2023-11-30)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |