{"id":"UBUNTU-CVE-2022-0358","details":"A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.","modified":"2026-01-30T00:47:53.112086Z","published":"2022-01-28T00:00:00Z","related":["USN-5307-1","USN-5489-1"],"upstream":["CVE-2022-0358"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0358"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5307-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5489-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-0358"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:6.2+dfsg-2ubuntu6.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:6.2+dfsg-2ubuntu6.2"}]}],"versions":["1:6.0+dfsg-2expubuntu1","1:6.0+dfsg-2expubuntu2","1:6.0+dfsg-2expubuntu4","1:6.2+dfsg-2ubuntu5","1:6.2+dfsg-2ubuntu6","1:6.2+dfsg-2ubuntu6.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-block-extra"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-guest-agent"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-arm"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-common"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-data"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-gui"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-mips"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-misc"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-ppc"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-s390x"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-sparc"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-x86"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-x86-microvm"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-system-x86-xen"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-user"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-user-binfmt"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-user-static"},{"binary_version":"1:6.2+dfsg-2ubuntu6.2","binary_name":"qemu-utils"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-0358.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}