A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2623-1 qemu security update
Debian DLA Debian DLA DLA-3099-1 qemu security update
EUVD EUVD EUVD-2021-26721 A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
Ubuntu USN Ubuntu USN USN-5010-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T16:53:17.469Z

Reserved: 2021-02-02T00:00:00

Link: CVE-2021-3392

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-23T20:15:13.440

Modified: 2024-11-21T06:21:24.040

Link: CVE-2021-3392

cve-icon Redhat

Severity : Low

Publid Date: 2021-02-02T00:00:00Z

Links: CVE-2021-3392 - Bugzilla

cve-icon OpenCVE Enrichment

No data.