Upstream information

CVE-2021-3392 at MITRE

Description

A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having low severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:N/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 3.2 3.2
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Access Vector Local Local
Access Complexity Low Low
Privileges Required High High
User Interaction None None
Scope Changed Changed
Confidentiality Impact None None
Integrity Impact None None
Availability Impact Low Low
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1189236 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SLE-HPC (12) qemu Not affected
SLE-HPC (12) xen Not affected
SLES (12) qemu Not affected
SLES (12) xen Not affected
SLES-BCL (12) qemu Not affected
SLES-BCL (12) xen Not affected
SLES-ESPOS (12) qemu Not affected
SLES-ESPOS (12) xen Not affected
SLES-LTSS (12) qemu Not affected
SLES-LTSS (12) xen Not affected
SLES-LTSS (15) qemu Not affected
SLES-LTSS (15) xen Not affected
SLES_BCL (15) qemu Not affected
SLES_BCL (15) xen Not affected
SLES_SAP (12) qemu Not affected
SLES_SAP (12) xen Not affected
SLES_SAP (15) qemu Not affected
SLES_SAP (15) xen Not affected
SLE_HPC-ESPOS (15) qemu Not affected
SLE_HPC-ESPOS (15) xen Not affected
SLE_HPC-LTSS (15) qemu Not affected
SLE_HPC-LTSS (15) xen Not affected
SUSE-Manager-Proxy (4.0) qemu Not affected
SUSE-Manager-Proxy (4.0) xen Not affected
SUSE-Manager-Retail-Branch-Server (4.0) qemu Not affected
SUSE-Manager-Retail-Branch-Server (4.0) xen Not affected
SUSE-Manager-Server (4.0) qemu Not affected
SUSE-Manager-Server (4.0) xen Not affected
SUSE_SLES_LTSS (11) kvm Not affected
SUSE_SLES_LTSS (11) xen Not affected
caasp (4.0) qemu Not affected
caasp (4.0) xen Not affected
hpe-helion-openstack (8) qemu Not affected
hpe-helion-openstack (8) xen Not affected
ses (5) qemu Not affected
ses (5) xen Not affected
ses (6) qemu Not affected
ses (6) xen Not affected
sle-module-basesystem (15) qemu Not affected
sle-module-basesystem (15) xen Not affected
sle-module-server-applications (15) qemu Not affected
sle-module-server-applications (15) xen Not affected
sle-pos (11) kvm Not affected
sle-pos (11) qemu Not affected
sle-pos (11) xen Not affected
sle-pos (12) qemu Not affected
sle-pos (12) xen Not affected
suse-openstack-cloud (7) qemu Not affected
suse-openstack-cloud (7) xen Not affected
suse-openstack-cloud (8) qemu Not affected
suse-openstack-cloud (8) xen Not affected
suse-openstack-cloud (9) qemu Not affected
suse-openstack-cloud (9) xen Not affected
suse-openstack-cloud-crowbar (8) qemu Not affected
suse-openstack-cloud-crowbar (8) xen Not affected
suse-openstack-cloud-crowbar (9) qemu Not affected
suse-openstack-cloud-crowbar (9) xen Not affected