|
Message-ID: <CAA8xKjVxi7xuZ-SFHGa63jFv9G2t4tEwVZ7qMaJP=ssynYGvKA@mail.gmail.com> Date: Fri, 16 Apr 2021 15:28:15 +0200 From: Mauro Matteo Cascella <mcascell@...hat.com> To: oss-security@...ts.openwall.com Cc: Cheolwoo Myung <cwmyung@....ac.kr>, Alexander Bulekov <alxndr@...edu> Subject: QEMU: ESP security fixes Hello, Several issues, including assertion failures, NULL pointer dereferences, and memory corruption flaws were identified in the am53c974 (ESP) device emulation of QEMU. A privileged guest user could use these flaws to crash the QEMU process on the host, resulting in a denial of service. Potential code execution with the privileges of the QEMU process cannot be ruled out. These issues are going to be fixed in the coming 6.0 release, see https://wiki.qemu.org/Planning/6.0#Fixed_in_rc3. Patch series: https://lists.gnu.org/archive/html/qemu-devel/2021-04/msg01000.html Upstream commits: https://git.qemu.org/?p=qemu.git;a=commit;h=0db895361b https://git.qemu.org/?p=qemu.git;a=commit;h=e392255766 https://git.qemu.org/?p=qemu.git;a=commit;h=e5455b8c1c https://git.qemu.org/?p=qemu.git;a=commit;h=c5fef9112b https://git.qemu.org/?p=qemu.git;a=commit;h=7b320a8e67 https://git.qemu.org/?p=qemu.git;a=commit;h=9954575173 https://git.qemu.org/?p=qemu.git;a=commit;h=fa7505c154 https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e33 https://git.qemu.org/?p=qemu.git;a=commit;h=0ebb5fd805 https://git.qemu.org/?p=qemu.git;a=commit;h=324c880989 https://git.qemu.org/?p=qemu.git;a=commit;h=607206948c Acknowledgements: Cheolwoo Myung and Alexander Bulekov (cc'd). CVE-2020-35504, CVE-2020-35505, CVE-2020-35506 assigned by Red Hat, Inc. Best regards. -- Mauro Matteo Cascella Red Hat Product Security PGP-Key ID: BB3410B0
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.