Количество 16
Количество 16
CVE-2020-35503
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-35503
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-35503
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-35503
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-35503
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI hos ...
GHSA-x852-p4x4-vcgf
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
openSUSE-SU-2021:2858-1
Security update for qemu
openSUSE-SU-2021:2789-1
Security update for qemu
SUSE-SU-2021:3575-1
Security update for qemu
SUSE-SU-2021:2858-1
Security update for qemu
SUSE-SU-2021:2813-1
Security update for qemu
SUSE-SU-2021:2789-1
Security update for qemu
SUSE-SU-2021:3635-1
Security update for qemu
SUSE-SU-2021:3614-1
Security update for qemu
SUSE-SU-2021:3613-1
Security update for qemu
openSUSE-SU-2021:1202-1
Security update for qemu
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-35503 A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | CVSS3: 6 | 0% Низкий | больше 4 лет назад | |
CVE-2020-35503 A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | CVSS3: 3.2 | 0% Низкий | около 5 лет назад | |
CVE-2020-35503 A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | CVSS3: 6 | 0% Низкий | больше 4 лет назад | |
CVE-2020-35503 A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | CVSS3: 6 | 0% Низкий | 4 месяца назад | |
CVE-2020-35503 A NULL pointer dereference flaw was found in the megasas-gen2 SCSI hos ... | CVSS3: 6 | 0% Низкий | больше 4 лет назад | |
GHSA-x852-p4x4-vcgf A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | CVSS3: 6 | 0% Низкий | больше 3 лет назад | |
openSUSE-SU-2021:2858-1 Security update for qemu | больше 4 лет назад | |||
openSUSE-SU-2021:2789-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:3575-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:2858-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:2813-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:2789-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:3635-1 Security update for qemu | около 4 лет назад | |||
SUSE-SU-2021:3614-1 Security update for qemu | больше 4 лет назад | |||
SUSE-SU-2021:3613-1 Security update for qemu | больше 4 лет назад | |||
openSUSE-SU-2021:1202-1 Security update for qemu | больше 4 лет назад |
Уязвимостей на страницу