6
CVSSv3

CVE-2021-3608

Published: 24/02/2022 Updated: 26/10/2022
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6 | Impact Score: 4 | Exploitability Score: 1.5
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions before 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 10.0

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #990563 qemu: CVE-2021-3608 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 2 Jul 2021 08:39:06 UTC Severity: important Tags: security, upstream Found in version qemu/1:52+d ...
No description is available for this CVE ...
A security issue was found in the QEMU implementation of VMWare's paravirtual RDMA device It could occur while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or undefined behavior due to the access of an uninitialized pointer ...