<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
QEMU: ESP security fixes
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Mauro Matteo Cascella <mcascell () redhat com>
Date: Fri, 16 Apr 2021 15:28:15 +0200
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Hello,
Several issues, including assertion failures, NULL pointer
dereferences, and memory corruption flaws were identified in the
am53c974 (ESP) device emulation of QEMU. A privileged guest user could
use these flaws to crash the QEMU process on the host, resulting in a
denial of service. Potential code execution with the privileges of the
QEMU process cannot be ruled out.
These issues are going to be fixed in the coming 6.0 release, see
https://wiki.qemu.org/Planning/6.0#Fixed_in_rc3.
Patch series:
https://lists.gnu.org/archive/html/qemu-devel/2021-04/msg01000.html
Upstream commits:
https://git.qemu.org/?p=qemu.git;a=commit;h=0db895361b
https://git.qemu.org/?p=qemu.git;a=commit;h=e392255766
https://git.qemu.org/?p=qemu.git;a=commit;h=e5455b8c1c
https://git.qemu.org/?p=qemu.git;a=commit;h=c5fef9112b
https://git.qemu.org/?p=qemu.git;a=commit;h=7b320a8e67
https://git.qemu.org/?p=qemu.git;a=commit;h=9954575173
https://git.qemu.org/?p=qemu.git;a=commit;h=fa7505c154
https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e33
https://git.qemu.org/?p=qemu.git;a=commit;h=0ebb5fd805
https://git.qemu.org/?p=qemu.git;a=commit;h=324c880989
https://git.qemu.org/?p=qemu.git;a=commit;h=607206948c
Acknowledgements: Cheolwoo Myung and Alexander Bulekov (cc'd).
CVE-2020-35504, CVE-2020-35505, CVE-2020-35506 assigned by Red Hat, Inc.
Best regards.
--
Mauro Matteo Cascella
Red Hat Product Security
PGP-Key ID: BB3410B0
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
QEMU: ESP security fixes Mauro Matteo Cascella (Apr 16)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->