Vulnerability CVE-2021-20181: Information
Description
A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
Severity: HIGH (7.5) Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
qemu | sisyphus | 6.0.0-alt1 | 8.2.3-alt1 | ALT-PU-2021-1767-1 | 271256 | Fixed |
qemu | sisyphus_e2k | 7.2.0-alt3.E2K.3 | 7.2.0-alt3.E2K.4 | ALT-PU-2024-1953-1 | - | Fixed |
qemu | p10 | 6.0.0-alt1 | 8.2.2-alt0.p10.1 | ALT-PU-2021-1767-1 | 271256 | Fixed |
qemu | p10_e2k | 7.2.0-alt3.E2K.0 | 7.2.0-alt3.E2K.3 | ALT-PU-2023-6766-1 | - | Fixed |
qemu | c10f1 | 6.0.0-alt1 | 8.2.2-alt0.p10.1 | ALT-PU-2021-1767-1 | 271256 | Fixed |
qemu | p11 | 6.0.0-alt1 | 8.2.3-alt1 | ALT-PU-2021-1767-1 | 271256 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1927007 |
|
[debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update |
|
https://www.zerodayinitiative.com/advisories/ZDI-21-159/ |
|
https://security.netapp.com/advisory/ntap-20210720-0009/ |
|
[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update |
|