Source: qemu Version: 1:5.2+dfsg-3 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for qemu, filling it with RC severity due to the privilege escalation potential (it affects only the version for bullseye and sid). I might oversee something, so just beeing on the safe side here. CVE-2020-35517[0]: | virtiofsd: potential privileged host device access from guest Patch TTBOMK not yet applied upstream. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-35517 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35517 [1] https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg05461.html [2] https://www.openwall.com/lists/oss-security/2021/01/22/1 Regards, Salvatore