First published: Mon Dec 21 2020(Updated: )
A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <6.0.0 | |
QEMU qemu | =6.0.0-rc1 | |
QEMU qemu | =6.0.0-rc2 | |
Debian Debian Linux | =10.0 | |
redhat/qemu | <6.0.0 | 6.0.0 |
debian/qemu | <=1:5.2+dfsg-11+deb11u3<=1:5.2+dfsg-11+deb11u2 | 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35505 is a NULL pointer dereference flaw found in the am53c974 SCSI host bus adapter emulation of QEMU.
CVE-2020-35505 has a severity rating of 4.4 (medium).
CVE-2020-35505 allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
Versions before 6.0.0 of QEMU are affected by CVE-2020-35505.
To mitigate CVE-2020-35505, update QEMU to version 6.0.0 or later.