Qmeu emulator built with the VirtFS(file system pass-through) support to share folders between host and guest is vulnerable to a Time of Creation To Time of Usage(TOCTTOU) issue. This occurs if the 'virtfs-proxy-helper' program is installed with SUID permissions OR has 'CAP_CHOWN' capability. An unprivileged user could use this flaw to potentially escalate their privileges to gain root access on the system. References: ----------- -> http://wiki.qemu.org/Documentation/9psetup -> http://www.openwall.com/lists/oss-security/2015/12/14/5 -> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a
Statement: This issue does not affect the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5. This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3. This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7. This issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.