CVE-2022-0216
Published: 26 August 2022
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
Priority
CVSS 3 base score: 4.4
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
bionic |
Released
(1:2.11+dfsg-1ubuntu7.41)
|
focal |
Released
(1:4.2-3ubuntu6.24)
|
|
impish |
Ignored
(reached end-of-life)
|
|
jammy |
Released
(1:6.2+dfsg-2ubuntu6.6)
|
|
kinetic |
Released
(1:7.0+dfsg-7ubuntu2.1)
|
|
trusty |
Released
(2.0.0+dfsg-2ubuntu1.47+esm2)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1:2.5+dfsg-5ubuntu10.51+esm1)
|
|
Patches: upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=6c8fa961da5e60f574bb52fd3ad44b1e9e8ad4b8 upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=4367a20cc442c56b05611b4224de9a61908f9eac |