cve/2022/CVE-2022-0216.md

18 lines
915 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0216](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0216)
![](https://img.shields.io/static/v1?label=Product&message=QEMU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Affects%20QEMU%20%3C%20v6.0.0%2C%20Fixed%20in%20v7.1.0-rc0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20-%20Use%20After%20Free&color=brighgreen)
### Description
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
### POC
#### Reference
- https://starlabs.sg/advisories/22/22-0216/
#### Github
- https://github.com/ARPSyndicate/cvemon