A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2021/04/16/3 | mailing list third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1909766 | issue tracking third party advisory patch |
https://www.openwall.com/lists/oss-security/2021/04/16/3 | mailing list third party advisory patch |
https://security.netapp.com/advisory/ntap-20210713-0006/ | third party advisory |
https://security.gentoo.org/glsa/202208-27 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html | third party advisory mailing list |