Vulnerability CVE-2022-0216: Information
Description
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
Severity: MEDIUM (4.4) Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
pve-qemu | sisyphus | 7.1.0-alt1 | 8.1.5-alt1 | ALT-PU-2022-3081-1 | 310016 | Fixed |
pve-qemu | p10 | 7.1.0-alt4 | 7.2.0-alt4 | ALT-PU-2022-3390-1 | 307814 | Fixed |
pve-qemu | c10f1 | 7.1.0-alt4 | 7.2.0-alt3 | ALT-PU-2022-3390-1 | 307814 | Fixed |
qemu | sisyphus | 6.0.0-alt1 | 8.2.2-alt3 | ALT-PU-2021-1767-1 | 271256 | Fixed |
qemu | sisyphus_e2k | 7.2.0-alt3.E2K.3 | 7.2.0-alt3.E2K.4 | ALT-PU-2024-1953-1 | - | Fixed |
qemu | sisyphus_riscv64 | 7.1.0-alt1 | 8.0.3-alt0.1.rv64 | ALT-PU-2022-7149-1 | - | Fixed |
qemu | p10 | 8.0.0-alt1.p10 | 8.2.2-alt0.p10.1 | ALT-PU-2023-1830-1 | 320227 | Fixed |
qemu | p10_e2k | 7.2.0-alt3.E2K.0 | 7.2.0-alt3.E2K.3 | ALT-PU-2023-6766-1 | - | Fixed |
qemu | c10f1 | 8.0.0-alt1.p10 | 8.0.4-alt1.p10 | ALT-PU-2023-1869-1 | 321192 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://gitlab.com/qemu-project/qemu/-/commit/4367a20cc4 |
|
https://access.redhat.com/security/cve/CVE-2022-0216 |
|
https://starlabs.sg/advisories/22/22-0216/ |
|
https://gitlab.com/qemu-project/qemu/-/issues/972 |
|
https://bugzilla.redhat.com/show_bug.cgi?id=2036953 |
|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ |