CVE-2022-0216

A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

12 Feb 2023, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/', 'name': 'FEDORA-2022-4387579e67', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ -

08 Dec 2022, 22:34

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ - Mailing List, Third Party Advisory
First Time Fedoraproject
Fedoraproject fedora

14 Nov 2022, 15:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/ -

01 Sep 2022, 14:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
CWE CWE-416
CPE cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
First Time Qemu
Qemu qemu
References (MISC) https://access.redhat.com/security/cve/CVE-2022-0216 - (MISC) https://access.redhat.com/security/cve/CVE-2022-0216 - Third Party Advisory
References (MISC) https://gitlab.com/qemu-project/qemu/-/commit/4367a20cc4 - (MISC) https://gitlab.com/qemu-project/qemu/-/commit/4367a20cc4 - Patch, Third Party Advisory
References (MISC) https://gitlab.com/qemu-project/qemu/-/issues/972 - (MISC) https://gitlab.com/qemu-project/qemu/-/issues/972 - Exploit, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2036953 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2036953 - Issue Tracking, Third Party Advisory
References (MISC) https://starlabs.sg/advisories/22/22-0216/ - (MISC) https://starlabs.sg/advisories/22/22-0216/ - Exploit, Third Party Advisory

26 Aug 2022, 18:47

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-26 18:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-0216

Mitre link : CVE-2022-0216

CVE.ORG link : CVE-2022-0216


JSON object : View

Products Affected

qemu

  • qemu

fedoraproject

  • fedora
CWE
CWE-416

Use After Free