Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2022-0216

Published: 26 August 2022

A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.

Priority

Low

CVSS 3 base score: 4.4

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
bionic
Released (1:2.11+dfsg-1ubuntu7.41)
focal
Released (1:4.2-3ubuntu6.24)
impish Ignored
(reached end-of-life)
jammy
Released (1:6.2+dfsg-2ubuntu6.6)
kinetic
Released (1:7.0+dfsg-7ubuntu2.1)
trusty
Released (2.0.0+dfsg-2ubuntu1.47+esm2)
upstream Needs triage

xenial
Released (1:2.5+dfsg-5ubuntu10.51+esm1)
Patches:
upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=6c8fa961da5e60f574bb52fd3ad44b1e9e8ad4b8
upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=4367a20cc442c56b05611b4224de9a61908f9eac