Vulnerability CVE-2021-3546: Information

Description

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.

Severity: HIGH (8.2) Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Published: June 2, 2021
Modified: Oct. 25, 2022
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
qemusisyphus6.1.0-alt18.2.2-alt3ALT-PU-2021-2713-1284381Fixed
qemusisyphus_e2k7.2.0-alt3.E2K.37.2.0-alt3.E2K.4ALT-PU-2024-1953-1-Fixed
qemup106.1.0-alt28.2.2-alt0.p10.1ALT-PU-2021-3363-1289854Fixed
qemup10_e2k7.2.0-alt3.E2K.07.2.0-alt3.E2K.3ALT-PU-2023-6766-1-Fixed
qemuc10f16.1.0-alt28.0.4-alt1.p10ALT-PU-2021-3363-1289854Fixed
qemuc9f25.2.0-alt6.c9.15.2.0-alt6.c9.1ALT-PU-2021-3078-1284979Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1958978
  • Issue Tracking
  • Third Party Advisory
[oss-security] 20210531 QEMU: security issues in vhost-user-gpu
  • Mailing List
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210720-0008/
  • Third Party Advisory
DSA-4980
  • Third Party Advisory
GLSA-202208-27
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
      End including
      6.0.0

      Configuration 2

      cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*