Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 16 Apr 2021 15:28:15 +0200
From: Mauro Matteo Cascella <>
Cc: Cheolwoo Myung <>, Alexander Bulekov <>
Subject: QEMU: ESP security fixes


Several issues, including assertion failures, NULL pointer
dereferences, and memory corruption flaws were identified in the
am53c974 (ESP) device emulation of QEMU. A privileged guest user could
use these flaws to crash the QEMU process on the host, resulting in a
denial of service. Potential code execution with the privileges of the
QEMU process cannot be ruled out.

These issues are going to be fixed in the coming 6.0 release, see

Patch series:

Upstream commits:;a=commit;h=0db895361b;a=commit;h=e392255766;a=commit;h=e5455b8c1c;a=commit;h=c5fef9112b;a=commit;h=7b320a8e67;a=commit;h=9954575173;a=commit;h=fa7505c154;a=commit;h=fbc6510e33;a=commit;h=0ebb5fd805;a=commit;h=324c880989;a=commit;h=607206948c

Acknowledgements: Cheolwoo Myung and Alexander Bulekov (cc'd).
CVE-2020-35504, CVE-2020-35505, CVE-2020-35506 assigned by Red Hat, Inc.

Best regards.
Mauro Matteo Cascella
Red Hat Product Security
PGP-Key ID: BB3410B0

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.