2.1
CVSSv2

CVE-2020-35503

Published: 02/06/2021 Updated: 13/05/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6 | Impact Score: 4 | Exploitability Score: 1.5
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

fedoraproject fedora 33

Vendor Advisories

Debian Bug report logs - #979678 CVE-2020-35503 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 9 Jan 2021 23:00:01 UTC Severity: normal Tags: security, upst ...
A NULL pointer dereference issue was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU It could occur in the megasas_command_cancelled() callback function in hw/scsi/megasasc while dropping a SCSI request A privileged guest user may exploit this issue to crash the QEMU process on the host, resulting in a denial of service conditi ...