A potential host privilege escalation issue was found in the virtio-fs shared file system daemon (virtiofsd) of the QEMU. Virtio-fs daemon shares host directory tree with a guest VM. The said privilege escalation scenario may occur if a privileged guest user was to create device special file in the shared directory and use it to r/w access host devices. A privileged guest user may use this flaw to arbitrarily access (r/w) host files resulting in DoS scenario or may potentially reach privilege escalation on the host. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg05461.html
External References: https://virtio-fs.gitlab.io/ https://www.openwall.com/lists/oss-security/2021/01/22/1
Acknowledgments: Name: Alex Xu (alxu.ca)
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1919106]
Statement: This issue does not affect the version of the qemu-kvm package as shipped with the Red Hat Enterprise Linux 5, 6 and 7. Virtio-fs is fairly new and is not built in the Red Hat Enterprise Linux 5, 6 and 7. This issue affects the version of the qemu-kvm package as shipped with the Red Hat Enterprise Linux 8. Future qemu-kvm package updates for Red Hat Enterprise Linux 8 may address this issue.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0711 https://access.redhat.com/errata/RHSA-2021:0711
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-35517
This issue has been addressed in the following products: Advanced Virtualization for RHEL 8.2.1 Via RHSA-2021:0743 https://access.redhat.com/errata/RHSA-2021:0743