Vulnerability Description
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | < 6.2.0 |
| Redhat | Codeready Linux Builder | 8.0 |
| Redhat | Codeready Linux Builder For Ibm Z Systems | 8.0 |
| Redhat | Codeready Linux Builder For Power Little Endian | 8.0 |
| Redhat | Openstack | 10 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Advanced Virtualization Eus | 8.4 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2020588Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/04/msg00002.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/09/msg00008.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202208-27Third Party Advisory
- https://security.netapp.com/advisory/ntap-20220225-0007/Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2020588Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/04/msg00002.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/09/msg00008.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202208-27Third Party Advisory
- https://security.netapp.com/advisory/ntap-20220225-0007/Third Party Advisory
FAQ
What is CVE-2021-3930?
CVE-2021-3930 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A...
How severe is CVE-2021-3930?
CVE-2021-3930 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3930?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Redhat Codeready Linux Builder, Redhat Codeready Linux Builder For Ibm Z Systems, Redhat Codeready Linux Builder For Power Little Endian, Redhat Openstack.