Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-35503
HistoryJun 02, 2021 - 12:00 a.m.

CVE-2020-35503

2021-06-0200:00:00
ubuntu.com
ubuntu.com
14
null pointer dereference
megasas-gen2 scsi
qemu
denial of service

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

AI Score

5.6

Confidence

High

EPSS

0

Percentile

12.6%

A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus
adapter emulation of QEMU in versions before and including 6.0. This issue
occurs in the megasas_command_cancelled() callback function while dropping
a SCSI request. This flaw allows a privileged guest user to crash the QEMU
process on the host, resulting in a denial of service. The highest threat
from this vulnerability is to system availability.

Bugs

Notes

Author Note
mdeslaur as of 2023-11-30, the proposed patch has not been commited upstream

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

AI Score

5.6

Confidence

High

EPSS

0

Percentile

12.6%