CVE-2020-35505

A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:6.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:6.0.0:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

22 Sep 2022, 21:03

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202208-27 - (GENTOO) https://security.gentoo.org/glsa/202208-27 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian
Debian debian Linux

05 Sep 2022, 06:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html -

15 Aug 2022, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-27 -

13 May 2022, 20:48

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210713-0006/ - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1909769 - Issue Tracking, Third Party Advisory (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1909769 - Issue Tracking, Patch, Third Party Advisory

14 Jun 2021, 15:22

Type Values Removed Values Added
CPE cpe:2.3:a:qemu:qemu:6.0.0:-:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:6.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:6.0.0:rc2:*:*:*:*:*:*

08 Jun 2021, 13:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 4.4
CWE CWE-476
CPE cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:6.0.0:-:*:*:*:*:*:*
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1909769 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1909769 - Issue Tracking, Third Party Advisory
References (MISC) https://www.openwall.com/lists/oss-security/2021/04/16/3 - (MISC) https://www.openwall.com/lists/oss-security/2021/04/16/3 - Mailing List, Patch, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/04/16/3 - (MLIST) http://www.openwall.com/lists/oss-security/2021/04/16/3 - Mailing List, Third Party Advisory

28 May 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 11:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-35505

Mitre link : CVE-2020-35505

CVE.ORG link : CVE-2020-35505


JSON object : View

Products Affected

debian

  • debian_linux

qemu

  • qemu
CWE
CWE-476

NULL Pointer Dereference