An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2021/05/31/1 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1958978 | issue tracking third party advisory |
https://security.netapp.com/advisory/ntap-20210720-0008/ | third party advisory |
https://www.debian.org/security/2021/dsa-4980 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202208-27 | third party advisory vendor advisory |