First published: Wed Jul 07 2021(Updated: )
A flaw was found in the ATI VGA emulation of QEMU. An inconsistent check and use of dst_[x|y] and s->regs.dst_[x|y] may lead to out-of-bounds write of vram_ptr. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations from the guest. A malicious guest user could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. Note: this is similar to <a href="https://access.redhat.com/security/cve/CVE-2020-11869">CVE-2020-11869</a>, <a href="https://access.redhat.com/security/cve/CVE-2020-24352">CVE-2020-24352</a> and <a href="https://access.redhat.com/security/cve/CVE-2020-27616">CVE-2020-27616</a>.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | >=4.0.0<=6.1.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.1+ds-2 1:9.1.1+ds-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3638 is an out-of-bounds memory access vulnerability in the ATI VGA device emulation of QEMU.
The severity of CVE-2021-3638 is high with a severity value of 6.5.
QEMU versions between 4.0.0 and 6.1.0, Fedora 36, Fedora 37, and Debian QEMU versions mentioned in the references are affected.
CVE-2021-3638 can allow a malicious guest to crash QEMU by exploiting the out-of-bounds memory access flaw.
Yes, updating to the fixed versions mentioned in the references will address the vulnerability.