Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-0216: scsi/lsi53c895a: really fix use-after-free in lsi_do_msgout (CVE-2022-0216) (4367a20c) · Commits · QEMU / QEMU · GitLab

A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.

CVE
#vulnerability#dos#git

@@ -8,6 +8,79 @@

#include “qemu/osdep.h”

#include “libqtest.h”

/*

* This used to trigger a UAF in lsi_do_msgout()

* https://gitlab.com/qemu-project/qemu/-/issues/972

*/

static void test_lsi_do_msgout_cancel_req(void)

{

QTestState *s;

if (sizeof(void *) == 4) {

g_test_skip(“memory size too big for 32-bit build”);

return;

}

s = qtest_init("-M q35 -m 4G -display none -nodefaults "

"-device lsi53c895a,id=scsi "

"-device scsi-hd,drive=disk0 "

"-drive file=null-co://,id=disk0,if=none,format=raw");

qtest_outl(s, 0xcf8, 0x80000810);

qtest_outl(s, 0xcf8, 0xc000);

qtest_outl(s, 0xcf8, 0x80000810);

qtest_outw(s, 0xcfc, 0x7);

qtest_outl(s, 0xcf8, 0x80000810);

qtest_outl(s, 0xcfc, 0xc000);

qtest_outl(s, 0xcf8, 0x80000804);

qtest_outw(s, 0xcfc, 0x05);

qtest_writeb(s, 0x69736c10, 0x08);

qtest_writeb(s, 0x69736c13, 0x58);

qtest_writeb(s, 0x69736c1a, 0x01);

qtest_writeb(s, 0x69736c1b, 0x06);

qtest_writeb(s, 0x69736c22, 0x01);

qtest_writeb(s, 0x69736c23, 0x07);

qtest_writeb(s, 0x69736c2b, 0x02);

qtest_writeb(s, 0x69736c48, 0x08);

qtest_writeb(s, 0x69736c4b, 0x58);

qtest_writeb(s, 0x69736c52, 0x04);

qtest_writeb(s, 0x69736c53, 0x06);

qtest_writeb(s, 0x69736c5b, 0x02);

qtest_outl(s, 0xc02d, 0x697300);

qtest_writeb(s, 0x5a554662, 0x01);

qtest_writeb(s, 0x5a554663, 0x07);

qtest_writeb(s, 0x5a55466a, 0x10);

qtest_writeb(s, 0x5a55466b, 0x22);

qtest_writeb(s, 0x5a55466c, 0x5a);

qtest_writeb(s, 0x5a55466d, 0x5a);

qtest_writeb(s, 0x5a55466e, 0x34);

qtest_writeb(s, 0x5a55466f, 0x5a);

qtest_writeb(s, 0x5a345a5a, 0x77);

qtest_writeb(s, 0x5a345a5b, 0x55);

qtest_writeb(s, 0x5a345a5c, 0x51);

qtest_writeb(s, 0x5a345a5d, 0x27);

qtest_writeb(s, 0x27515577, 0x41);

qtest_outl(s, 0xc02d, 0x5a5500);

qtest_writeb(s, 0x364001d0, 0x08);

qtest_writeb(s, 0x364001d3, 0x58);

qtest_writeb(s, 0x364001da, 0x01);

qtest_writeb(s, 0x364001db, 0x26);

qtest_writeb(s, 0x364001dc, 0x0d);

qtest_writeb(s, 0x364001dd, 0xae);

qtest_writeb(s, 0x364001de, 0x41);

qtest_writeb(s, 0x364001df, 0x5a);

qtest_writeb(s, 0x5a41ae0d, 0xf8);

qtest_writeb(s, 0x5a41ae0e, 0x36);

qtest_writeb(s, 0x5a41ae0f, 0xd7);

qtest_writeb(s, 0x5a41ae10, 0x36);

qtest_writeb(s, 0x36d736f8, 0x0c);

qtest_writeb(s, 0x36d736f9, 0x80);

qtest_writeb(s, 0x36d736fa, 0x0d);

qtest_outl(s, 0xc02d, 0x364000);

qtest_quit(s);

}

/*

* This used to trigger the assert in lsi_do_dma()

* https://bugs.launchpad.net/qemu/+bug/697510

@@ -44,5 +117,8 @@ int main(int argc, char **argv)

qtest_add_func("fuzz/lsi53c895a/lsi_do_dma_empty_queue",

test_lsi_do_dma_empty_queue);

qtest_add_func("fuzz/lsi53c895a/lsi_do_msgout_cancel_req",

test_lsi_do_msgout_cancel_req);

return g_test_run();

}

Related news

Gentoo Linux Security Advisory 202408-18

Gentoo Linux Security Advisory 202408-18 - Multiple vulnerabilities have been discovered in QEMU, the worst of which could lead to a denial of service. Versions greater than or equal to 8.0.0 are affected.

Ubuntu Security Notice USN-5772-1

Ubuntu Security Notice 5772-1 - It was discovered that QEMU incorrectly handled bulk transfers from SPICE clients. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that QEMU did not properly manage memory when it transfers the USB packets. A malicious guest attacker could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907