2.1
CVSSv2

CVE-2021-3930

Published: 18/02/2022 Updated: 25/10/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that the QEMU vhost-user GPU device contained several security issues. An attacker inside the guest could use these issues to cause QEMU to crash, resulting in a denial of service, leak sensitive information, or possibly execute arbitrary code. This issue only affected Ubuntu 21.10. (CVE-2021-3544, CVE-2021-3545, CVE-2021-3546)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

redhat openstack 10

redhat enterprise linux 8.0

redhat openstack 13

redhat enterprise linux for power little endian 8.0

redhat enterprise linux for ibm z systems 8.0

redhat codeready linux builder for ibm z systems 8.0

redhat codeready linux builder for power little endian 8.0

redhat codeready linux builder 8.0

redhat enterprise linux advanced virtualization eus 8.4

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several security issues were fixed in QEMU ...
Several security issues were fixed in QEMU ...
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service The highest threat from th ...
An off-by-one error was found in the SCSI Device emulation in QEMU It could occur in hw/scsi/scsi-diskc:mode_sense_page() while processing MODE SELECT commands if 'page' was set to MODE_PAGE_ALLS (0x3f) Specifically, 'page' was used to index the stack-allocated 'mode_sense_valid' buffer (size=0x3f), causing an off-by-one error when trying to acc ...