SB2021053119 - Multiple vulnerabilities in QEMU
Published: May 31, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2021-3544)
The vulnerability allows a remote user to perform DoS attack on the target system.
The vulnerability exists due to multiple memory leaks in the vhost-user-gpu/vhost-user-gpu.c. A remote authenticated user of the guest operating system can force the application to leak memory and perform denial of service attack.
2) Information disclosure (CVE-ID: CVE-2021-3545)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to uninitialized memory disclosure within the virgl_cmd_get_capset_info() function in vhost-user-gpu/virgl.c. A remote authenticated user of the guest operating system can gain unauthorized access to sensitive information on the system.
3) Out-of-bounds write (CVE-ID: CVE-2021-3546)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing untrusted input within the virgl_cmd_get_capset() function in vhost-user-gpu/virgl.c. A remote authenticated user of the guest operating system can trigger an out-of-bounds write and escalate privileges.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://seclists.org/oss-sec/2021/q2/176
- https://gitlab.com/qemu-project/qemu/-/commit/86dd8fac
- https://gitlab.com/qemu-project/qemu/-/commit/b9f79858
- https://gitlab.com/qemu-project/qemu/-/commit/b7afebcf
- https://gitlab.com/qemu-project/qemu/-/commit/f6091d86
- https://gitlab.com/qemu-project/qemu/-/commit/63736af5
- https://gitlab.com/qemu-project/qemu/-/commit/121841b2
- https://gitlab.com/qemu-project/qemu/-/commit/9f22893a