Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3582

Опубликовано: 25 мар. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1
CVSS3: 6.5

Описание

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

1:6.0+dfsg-2expubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

1:4.2-3ubuntu6.17
esm-infra/xenial

not-affected

code not present
focal

released

1:4.2-3ubuntu6.17
groovy

released

1:5.0-5ubuntu9.9
hirsute

released

1:5.2+dfsg-9ubuntu3.1
impish

released

1:6.0+dfsg-2expubuntu1

Показывать по

EPSS

Процентиль: 5%
0.00024
Низкий

2.1 Low

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.2
redhat
около 4 лет назад

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
nvd
больше 3 лет назад

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
debian
больше 3 лет назад

A flaw was found in the QEMU implementation of VMWare's paravirtual RD ...

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
fstec
около 4 лет назад

Уязвимость команды PVRDMA_CMD_CREATE_MR эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 5%
0.00024
Низкий

2.1 Low

CVSS2

6.5 Medium

CVSS3