qemu-kvm, qemu
2017-04-21 03:04
CVE-2017-7471 qemu-kvm
CVE-2017-7471 qemu


9p: virtfs allows guest to change filesystem attributes on host The local backend was recently converted to using "at*()" syscalls in order to ensure all accesses happen below the shared directory. This requires that we only pass relative paths, otherwise the dirfd argument to the "at*()" syscalls is ignored and the path is treated as an absolute path in the host. This is actually the case for paths in all fids, with the notable exception of the root fid, whose path is "/". This causes the following backend ops to act on the "/" directory of the host instead of the virtfs shared directory when the export root is involved.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information



Release Package Reason
precise qemu-kvm not-affected
qemu DNE
trusty qemu-kvm DNE
qemu not-affected
vivid/ubuntu-core qemu-kvm DNE
qemu DNE
vivid/stable-phone-overlay qemu-kvm DNE
qemu DNE
xenial qemu-kvm DNE
qemu not-affected
yakkety qemu-kvm DNE
qemu not-affected
zesty qemu-kvm DNE
qemu not-affected
devel qemu-kvm DNE
qemu not-affected

Needs Triage

Release Package Reason
upstream qemu-kvm needs-triage
qemu needs-triage