A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302744531140615624852398485415115787939",
"79488242875555874406244692487447543669",
"54993752283591408625803543982954136445",
"296848869420297648612894062423751011378",
"321190977610121332206507786484912906120",
"96468402481531211804829970676617099666",
"162131700049634049016222100105217357312",
"60882616724414873124283531094951134433",
"167377636730820718430661922098317479089",
"277010097093721354642499543200327550277"
]
},
"target": {
"file": "tools/virtiofsd/passthrough_ll.c"
},
"source": "https://gitlab.com/qemu-project/qemu@449e8171f96a6a944d1f3b7d3627ae059eae21ca",
"id": "CVE-2022-0358-7e50f8d8",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "263390199775715885756993363120077698073",
"length": 3513.0
},
"target": {
"file": "tools/virtiofsd/passthrough_ll.c",
"function": "main"
},
"source": "https://gitlab.com/qemu-project/qemu@449e8171f96a6a944d1f3b7d3627ae059eae21ca",
"id": "CVE-2022-0358-f06ac984",
"deprecated": false,
"signature_version": "v1"
}
]