4.6
CVSSv2

CVE-2020-35517

Published: 28/01/2021 Updated: 12/02/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

Vendor Advisories

Debian Bug report logs - #980814 qemu: CVE-2020-35517 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 22 Jan 2021 20:03:04 UTC Severity: grave Tags: security, upstream Found in version qemu/1:52 ...
A potential host privilege escalation issue was found in the virtio-fs shared file system daemon (virtiofsd) of the QEMU Virtio-fs daemon shares the host directory tree with a guest VM The said privilege escalation scenario may occur if a privileged guest user was to create device special file in the shared directory and use it to r/w access hos ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-35517 QEMU: virtiofsd: potential privileged host device access from guest <!--X-Subject-Header-End--> <!--X-Head-of-M ...