2.1
CVSSv2

CVE-2020-35504

Published: 28/05/2021 Updated: 22/09/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6 | Impact Score: 4 | Exploitability Score: 1.5
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions prior to 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

fedoraproject fedora 33

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #979679 CVE-2020-35504 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 9 Jan 2021 23:00:04 UTC Severity: normal Tags: security, upst ...
A NULL pointer dereference issue was found in the SCSI emulation support of QEMU It could occur in the scsi_req_continue() function in hw/scsi/scsi-busc while handling the 'Information Transfer' command (CMD_TI) of the am53c974 SCSI host bus adapter A privileged guest user may abuse this issue to crash the QEMU process on the host, resulting in ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> QEMU: ESP security fixes <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Mauro Matteo Cascella &lt;mcascell () re ...