4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1.4 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
MULTIPLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:M/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.7%
qemu is vulnerable to a use-after-free. LSI53C895A SCSI Host Bus Adapter emulation of QEMU occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
access.redhat.com/security/cve/CVE-2022-0216
bugzilla.redhat.com/show_bug.cgi?id=2036953
gitlab.com/qemu-project/qemu/-/commit/4367a20cc4
gitlab.com/qemu-project/qemu/-/issues/972
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/
lists.fedoraproject.org/archives/list/[email protected]/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/
security-tracker.debian.org/tracker/CVE-2022-0216
starlabs.sg/advisories/22/22-0216/
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1.4 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
MULTIPLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:M/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.7%