CVE-2021-3392

Name
CVE-2021-3392
Description
A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1924042
Exploit https://bugs.launchpad.net/qemu/+bug/1914236
MLIST https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html
CONFIRM https://security.netapp.com/advisory/ntap-20210507-0001/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= 2.10.0 <= 5.2.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.13-community 5.2.0-r3 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable