Your submission was sent successfully! Close

CVE-2021-3713

Published: 25 August 2021

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.

Priority

Low

CVSS 3 base score: 7.4

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Needed

Ubuntu 21.04 (Hirsute Hippo) Needed

Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1:4.2-3ubuntu6.17)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1:2.11+dfsg-1ubuntu7.37)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable

Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable

Patches:
Upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=13b250b12ad3c59114a6a17d59caf073ce45b33a