CVE-2020-35503 PUBLISHED

A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

EPSS 0.02% · 6.4th percentile

Risk Scores

EPSS Score
0.02%
6.4th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSqemu0, 1:6.2+dfsg-2ubuntu6.27, 1:6.2+dfsg-2ubuntu6.26
Ubuntu:Pro:14.04:LTSqemu2.0.0+dfsg-2ubuntu1.6, 2.0.0+dfsg-2ubuntu1.7, 2.0.0+dfsg-2ubuntu1.8
Ubuntu:25.10qemu1:10.1.0+ds-5ubuntu2.2, 0, 1:9.2.1+ds-1ubuntu5
Ubuntu:Pro:18.04:LTSqemu1:2.11+dfsg-1ubuntu7.20, 1:2.11+dfsg-1ubuntu7.21, 1:2.11+dfsg-1ubuntu7.22
Ubuntu:20.04:LTSqemu1:4.2-3ubuntu6.4, 1:4.2-3ubuntu6.6, 1:4.2-3ubuntu6.7
Ubuntu:Pro:16.04:LTSqemu1:2.5+dfsg-5ubuntu7, 1:2.5+dfsg-5ubuntu10.32, 1:2.5+dfsg-5ubuntu10.33
Ubuntu:24.04:LTSqemu1:8.2.2+ds-0ubuntu1.2, 1:8.2.2+ds-0ubuntu1.4, 1:8.2.2+ds-0ubuntu1.5

Timeline

References

Open in Interactive Console →