CVE-2021-3638

Related Vulnerabilities: CVE-2021-3638  

An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.

Description

An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.

Statement

The ATI VGA emulation feature was introduced in QEMU upstream version 4.0.0. This flaw does not affect the versions of `qemu-kvm` as shipped with Red Hat products, as they do not include support for ATI VGA emulation.

The ATI VGA emulation feature was introduced in QEMU upstream version 4.0.0. This flaw does not affect the versions of qemu-kvm as shipped with Red Hat products, as they do not include support for ATI VGA emulation.

Additional Information

  • Bugzilla 1979858: CVE-2021-3638 QEMU: ati-vga: inconsistent check in ati_2d_blt() may lead to out-of-bounds write
  • CWE-787: Out-of-bounds Write
  • FAQ: Frequently asked questions about CVE-2021-3638