Vulnerability Description
A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | >= 5.0.0, < 5.2.50 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1933668Issue TrackingPatchThird Party Advisory
- https://security.gentoo.org/glsa/202208-27Third Party Advisory
- https://security.netapp.com/advisory/ntap-20210507-0002/Third Party Advisory
- https://www.openwall.com/lists/oss-security/2021/03/08/1Mailing ListPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1933668Issue TrackingPatchThird Party Advisory
- https://security.gentoo.org/glsa/202208-27Third Party Advisory
- https://security.netapp.com/advisory/ntap-20210507-0002/Third Party Advisory
- https://www.openwall.com/lists/oss-security/2021/03/08/1Mailing ListPatchThird Party Advisory
FAQ
What is CVE-2021-20263?
CVE-2021-20263 is a vulnerability with a CVSS score of 3.3 (LOW). A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially...
How severe is CVE-2021-20263?
CVE-2021-20263 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20263?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu.