Headline
CVE-2020-35506: security - QEMU: ESP security fixes
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the ‘Information Transfer’ command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
- Products
- Openwall GNU/*/Linux server OS
- Linux Kernel Runtime Guard
- John the Ripper password cracker
- Free & Open Source for any platform
- in the cloud
- Pro for Linux
- Pro for macOS
- Wordlists for password cracking
- passwdqc policy enforcement
- Free & Open Source for Unix
- Pro for Windows (Active Directory)
- yescrypt KDF & password hashing
- yespower Proof-of-Work (PoW)
- crypt_blowfish password hashing
- phpass ditto in PHP
- tcb better password shadowing
- Pluggable Authentication Modules
- scanlogd port scan detector
- popa3d tiny POP3 daemon
- blists web interface to mailing lists
- msulogin single user mode login
- php_mt_seed mt_rand() cracker
- Services
- Publications
- Articles
- Presentations
- Resources
- Mailing lists
- Community wiki
- Source code repositories (GitHub)
- Source code repositories (CVSweb)
- File archive & mirrors
- How to verify digital signatures
- OVE IDs
- What’s new
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 16 Apr 2021 15:28:15 +0200 From: Mauro Matteo Cascella <mcascell@…hat.com> To: oss-security@…ts.openwall.com Cc: Cheolwoo Myung <cwmyung@…ac.kr>, Alexander Bulekov <alxndr@…edu> Subject: QEMU: ESP security fixes
Hello,
Several issues, including assertion failures, NULL pointer dereferences, and memory corruption flaws were identified in the am53c974 (ESP) device emulation of QEMU. A privileged guest user could use these flaws to crash the QEMU process on the host, resulting in a denial of service. Potential code execution with the privileges of the QEMU process cannot be ruled out.
These issues are going to be fixed in the coming 6.0 release, see https://wiki.qemu.org/Planning/6.0#Fixed_in_rc3.
Patch series: https://lists.gnu.org/archive/html/qemu-devel/2021-04/msg01000.html
Upstream commits: https://git.qemu.org/?p=qemu.git;a=commit;h=0db895361b https://git.qemu.org/?p=qemu.git;a=commit;h=e392255766 https://git.qemu.org/?p=qemu.git;a=commit;h=e5455b8c1c https://git.qemu.org/?p=qemu.git;a=commit;h=c5fef9112b https://git.qemu.org/?p=qemu.git;a=commit;h=7b320a8e67 https://git.qemu.org/?p=qemu.git;a=commit;h=9954575173 https://git.qemu.org/?p=qemu.git;a=commit;h=fa7505c154 https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e33 https://git.qemu.org/?p=qemu.git;a=commit;h=0ebb5fd805 https://git.qemu.org/?p=qemu.git;a=commit;h=324c880989 https://git.qemu.org/?p=qemu.git;a=commit;h=607206948c
Acknowledgements: Cheolwoo Myung and Alexander Bulekov (cc’d). CVE-2020-35504, CVE-2020-35505, CVE-2020-35506 assigned by Red Hat, Inc.
Best regards.
Mauro Matteo Cascella Red Hat Product Security PGP-Key ID: BB3410B0
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.
Related news
Gentoo Linux Security Advisory 202208-27 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 7.0.0 are affected.
Gentoo Linux Security Advisory 202208-27 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 7.0.0 are affected.
Gentoo Linux Security Advisory 202208-27 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 7.0.0 are affected.