4.4
CVSSv3

CVE-2022-0216

Published: 26/08/2022 Updated: 12/02/2023
CVSS v3 Base Score: 4.4 | Impact Score: 3.6 | Exploitability Score: 0.8
VMScore: 0

Vulnerability Summary

It exists that the QEMU SCSI device emulation incorrectly handled certain MODE SELECT commands. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3930)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

fedoraproject fedora 37

Vendor Advisories

Debian Bug report logs - #1014590 qemu: CVE-2022-0216 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 8 Jul 2022 12:39:02 UTC Severity: important Tags: security, upstream Forwarded to gitl ...
Several security issues were fixed in QEMU ...
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of servic ...