Description
An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4980-1 | qemu security update |
EUVD |
EUVD-2021-26857 | An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process. |
Ubuntu USN |
USN-5010-1 | QEMU vulnerabilities |
Ubuntu USN |
USN-5307-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:07.614Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-3546
No data.
Status : Modified
Published: 2021-06-02T14:15:11.120
Modified: 2024-11-21T06:21:48.610
Link: CVE-2021-3546
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN