Unrated severityNVD Advisory· Published May 28, 2021· Updated Aug 4, 2024
CVE-2020-35506
CVE-2020-35506
Description
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- security.gentoo.org/glsa/202208-27mitrevendor-advisoryx_refsource_GENTOO
- www.openwall.com/lists/oss-security/2021/04/16/3mitremailing-listx_refsource_MLIST
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20210713-0006/mitrex_refsource_CONFIRM
- www.openwall.com/lists/oss-security/2021/04/16/3mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.