A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2623-1 | qemu security update |
Debian DLA |
DLA-3099-1 | qemu security update |
EUVD |
EUVD-2021-26721 | A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected. |
Ubuntu USN |
USN-5010-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T16:53:17.469Z
Reserved: 2021-02-02T00:00:00
Link: CVE-2021-3392
No data.
Status : Modified
Published: 2021-03-23T20:15:13.440
Modified: 2024-11-21T06:21:24.040
Link: CVE-2021-3392
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN