Source: qemu
Version: 1:5.2+dfsg-3
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for qemu, filling it with RC
severity due to the privilege escalation potential (it affects only
the version for bullseye and sid). I might oversee something, so just
beeing on the safe side here.

CVE-2020-35517[0]:
| virtiofsd: potential privileged host device access from guest

Patch TTBOMK not yet applied upstream.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-35517
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35517
[1] https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg05461.html
[2] https://www.openwall.com/lists/oss-security/2021/01/22/1

Regards,
Salvatore

Reply via email to