2.1
CVSSv2

CVE-2020-35505

Published: 28/05/2021 Updated: 22/09/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.4 | Impact Score: 3.6 | Exploitability Score: 0.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions prior to 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

qemu qemu 6.0.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #984455 CVE-2020-35505 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 3 Mar 2021 19:27:08 UTC Severity: normal Tags: security, upst ...
A NULL pointer dereference issue was found in the am53c974 SCSI host bus adapter emulation of QEMU It could occur in the do_busid_cmd() function in hw/scsi/espc while handling the 'Information Transfer' command (CMD_TI) A privileged guest user may abuse this issue to crash the QEMU process on the host, resulting in a denial of service condition ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> QEMU: ESP security fixes <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Mauro Matteo Cascella &lt;mcascell () re ...