First published: Fri Apr 30 2021(Updated: )
A flaw was found in the USB redirection support (usb-redir) of QEMU. More specifically, usb-host and usb-redirect try to batch bulk transfers by combining many small USB packets into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk sending is used in usbredir_handle_bulk_data() to dynamically allocate a variable length array (VLA) on the stack. Since the total size is not bounded, a malicious guest could be able to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1955695 is classified as moderate due to potential impact on USB redirection functionality.
To fix REDHAT-BUG-1955695, update your QEMU installation to the latest patched version provided by the vendor.
The components affected by REDHAT-BUG-1955695 are the usb-host and usb-redirect functionalities in QEMU.
REDHAT-BUG-1955695 is a flaw related to batch processing of USB packets in QEMU's USB redirection support.
The vendor for REDHAT-BUG-1955695 is QEMU.