{"containers":{"cna":{"affected":[{"product":"QEMU","vendor":"n/a","versions":[{"status":"affected","version":"qemu 6.0.0"}]}],"descriptions":[{"lang":"en","value":"A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-476","description":"CWE-476","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-09-05T05:06:12.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"[oss-security] 20210416 QEMU: ESP security fixes","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2021/04/16/3"},{"tags":["x_refsource_MISC"],"url":"https://www.openwall.com/lists/oss-security/2021/04/16/3"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909769"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20210713-0006/"},{"name":"GLSA-202208-27","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/202208-27"},{"name":"[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2020-35505","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"QEMU","version":{"version_data":[{"version_value":"qemu 6.0.0"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-476"}]}]},"references":{"reference_data":[{"name":"[oss-security] 20210416 QEMU: ESP security fixes","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2021/04/16/3"},{"name":"https://www.openwall.com/lists/oss-security/2021/04/16/3","refsource":"MISC","url":"https://www.openwall.com/lists/oss-security/2021/04/16/3"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1909769","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909769"},{"name":"https://security.netapp.com/advisory/ntap-20210713-0006/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20210713-0006/"},{"name":"GLSA-202208-27","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/202208-27"},{"name":"[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T17:02:08.049Z"},"title":"CVE Program Container","references":[{"name":"[oss-security] 20210416 QEMU: ESP security fixes","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/04/16/3"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.openwall.com/lists/oss-security/2021/04/16/3"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1909769"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20210713-0006/"},{"name":"GLSA-202208-27","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/202208-27"},{"name":"[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2020-35505","datePublished":"2021-05-28T10:20:48.000Z","dateReserved":"2020-12-17T00:00:00.000Z","dateUpdated":"2024-08-04T17:02:08.049Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}