Vulnerability Name: | CVE-2021-3930 (CCN-220195) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-02-04 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2021-02-04 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-10-25 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
2.8 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-193 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3930 Source: CCN Type: Red Hat Bugzilla - Bug 2020588 (CVE-2021-3930) - CVE-2021-3930 QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2020588 Source: XF Type: UNKNOWN qemu-cve20213930-dos(220195) Source: CCN Type: QEMU GitLab hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update Source: GENTOO Type: Third Party Advisory GLSA-202208-27 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220225-0007/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |