Description
An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
References
https://bugzilla.redhat.com/show_bug.cgi?id=1979858
https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html
https://security.netapp.com/advisory/ntap-20220407-0003/
https://ubuntu.com/security/CVE-2021-3638
https://bugzilla.redhat.com/show_bug.cgi?id=1979858
https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html
https://security.netapp.com/advisory/ntap-20220407-0003/
https://ubuntu.com/security/CVE-2021-3638
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-03T22:15:08.147Z
3 years agoLast modified
2024-11-21T05:22:02.743Z
1 year ago