CVE-2020-35506 log

Source
Severity Medium
Remote No
Type Arbitrary code execution
Description
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU. It could occur in the esp_do_dma() function in hw/scsi/esp.c while handling the 'Information Transfer' command (CMD_TI). A privileged guest user may abuse this issue to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
Group Package Affected Fixed Severity Status Ticket
AVG-1308 qemu 5.2.0-4 6.0.0-1 Medium Fixed
References
https://www.openwall.com/lists/oss-security/2021/04/16/3
https://bugzilla.redhat.com/show_bug.cgi?id=1909996
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=7b320a8e67a534925048cbabfa51431e0349dafd
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=fa7505c154d4d00ad89a747be2eda556643ce00e
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9