Vulnerability CVE-2021-3682: Information
Description
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
Severity: HIGH (8.5) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
qemu | sisyphus | 6.1.0-alt1 | 8.2.4-alt1 | ALT-PU-2021-2713-1 | 284381 | Fixed |
qemu | sisyphus_e2k | 7.2.0-alt3.E2K.3 | 7.2.0-alt3.E2K.4 | ALT-PU-2024-1953-1 | - | Fixed |
qemu | p10 | 6.1.0-alt2 | 8.2.2-alt0.p10.1 | ALT-PU-2021-3363-1 | 289854 | Fixed |
qemu | p10_e2k | 7.2.0-alt3.E2K.0 | 7.2.0-alt3.E2K.3 | ALT-PU-2023-6766-1 | - | Fixed |
qemu | c10f1 | 6.1.0-alt2 | 8.2.2-alt0.p10.1 | ALT-PU-2021-3363-1 | 289854 | Fixed |
qemu | p11 | 6.1.0-alt1 | 8.2.3-alt1 | ALT-PU-2021-2713-1 | 284381 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1989651 |
|
https://security.netapp.com/advisory/ntap-20210902-0006/ |
|
[debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update |
|
DSA-4980 |
|
GLSA-202208-27 |
|
[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update |
|