CVE-2021-3392

Beschreibung:
A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object ‚req‘ from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.

CWE: CWE-416

CVSS-Bewertung
CVSS 2: LOW – 2.1 (Version: 2.0)
CVSS 3: LOW – 3.2 (Version: 3.1)

Links:

NVD – CVE-2021-3392
CVE – CVE-2021-3392

Link (max. 20) Quelle Tags
https://bugzilla.redhat.com/show_bug.cgi?id=1924042 MISC Issue Tracking Patch Third Party Advisory
https://bugs.launchpad.net/qemu/+bug/1914236 MISC Exploit Third Party Advisory Third Party Advisory
[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update MLIST Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0001/ CONFIRM Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0006/ CONFIRM Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc MISC Third Party Advisory
[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
GLSA-202103-03 GENTOO Third Party Advisory
https://www.tenable.com/security/tns-2021-06 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-05 CONFIRM Third Party Advisory
FEDORA-2021-cbf14ab8f9 FEDORA Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10356 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-09 CONFIRM

Quelle: NVD – CVE-2021-3392
Datum Veröffentlichung: 2021-03-23T20:15Z, Datum letzte Änderung: 2021-05-07T05:15Z