Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3546

Опубликовано: 02 июн. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 8.2

Описание

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

1:6.2+dfsg-2ubuntu5
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

1:4.2-3ubuntu6.17
esm-infra/xenial

not-affected

code not present
focal

released

1:4.2-3ubuntu6.17
groovy

released

1:5.0-5ubuntu9.9
hirsute

released

1:5.2+dfsg-9ubuntu3.1
impish

released

1:6.0+dfsg-2expubuntu1.2

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

precise/esm

ignored

end of life, was deferred

Показывать по

EPSS

Процентиль: 23%
0.00074
Низкий

4.6 Medium

CVSS2

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
около 4 лет назад

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.

CVSS3: 8.2
nvd
около 4 лет назад

An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.

CVSS3: 8.2
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 8.2
debian
около 4 лет назад

An out-of-bounds write vulnerability was found in the virtio vhost-use ...

CVSS3: 8.2
github
около 3 лет назад

A flaw was found in vhost-user-gpu of QEMU in versions up to and including 6.0. An out-of-bounds write vulnerability can allow a malicious guest to crash the QEMU process on the host resulting in a denial of service or potentially execute arbitrary code on the host with the privileges of the QEMU process. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

EPSS

Процентиль: 23%
0.00074
Низкий

4.6 Medium

CVSS2

8.2 High

CVSS3