CVE-2020-35506 - log back

CVE-2020-35506 edited at 16 Apr 2021 14:21:30
References
+ https://www.openwall.com/lists/oss-security/2021/04/16/3
https://bugzilla.redhat.com/show_bug.cgi?id=1909996
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=7b320a8e67a534925048cbabfa51431e0349dafd
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=fa7505c154d4d00ad89a747be2eda556643ce00e
+ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9
CVE-2020-35506 edited at 29 Dec 2020 11:35:02
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Arbitrary code execution
Description
+ A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU. It could occur in the esp_do_dma() function in hw/scsi/esp.c while handling the 'Information Transfer' command (CMD_TI). A privileged guest user may abuse this issue to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
References
+ https://bugzilla.redhat.com/show_bug.cgi?id=1909996
CVE-2020-35506 created at 29 Dec 2020 11:30:07
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes