CVE Vulnerabilities

CVE-2020-35503

NULL Pointer Dereference

Published: Jun 02, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.2 LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*6.0.0 (including)
QemuUbuntubionic*
QemuUbuntufocal*
QemuUbuntugroovy*
QemuUbuntuhirsute*
QemuUbuntuimpish*
QemuUbuntukinetic*
QemuUbuntulunar*
QemuUbuntumantic*
QemuUbuntuoracular*
QemuUbuntuplucky*
QemuUbuntutrusty*
QemuUbuntutrusty/esm*
QemuUbuntuxenial*
Qemu-kvmUbuntuprecise/esm*

Potential Mitigations

References