{"id":"UBUNTU-CVE-2021-3545","details":"An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.","modified":"2026-02-04T04:32:51.838558Z","published":"2021-06-02T14:15:00Z","related":["USN-5010-1","USN-5307-1"],"upstream":["CVE-2021-3545"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3545"},{"type":"REPORT","url":"https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html"},{"type":"REPORT","url":"https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01153.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5010-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5307-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-3545"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:4.2-3ubuntu6.17?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2-3ubuntu6.17"}]}],"versions":["1:4.0+dfsg-0ubuntu9","1:4.0+dfsg-0ubuntu10","1:4.2-1ubuntu1","1:4.2-1ubuntu2","1:4.2-3ubuntu1","1:4.2-3ubuntu2","1:4.2-3ubuntu3","1:4.2-3ubuntu4","1:4.2-3ubuntu5","1:4.2-3ubuntu6","1:4.2-3ubuntu6.1","1:4.2-3ubuntu6.2","1:4.2-3ubuntu6.3","1:4.2-3ubuntu6.4","1:4.2-3ubuntu6.5","1:4.2-3ubuntu6.6","1:4.2-3ubuntu6.7","1:4.2-3ubuntu6.8","1:4.2-3ubuntu6.9","1:4.2-3ubuntu6.10","1:4.2-3ubuntu6.11","1:4.2-3ubuntu6.12","1:4.2-3ubuntu6.14","1:4.2-3ubuntu6.15","1:4.2-3ubuntu6.16"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-block-extra","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-guest-agent","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-kvm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-arm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-common","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-data","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-gui","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-mips","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-misc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-ppc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-s390x","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-sparc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86-microvm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86-xen","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user-binfmt","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user-static","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-utils","binary_version":"1:4.2-3ubuntu6.17"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3545.json"}},{"package":{"name":"qemu","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:6.2+dfsg-2ubuntu5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:6.2+dfsg-2ubuntu5"}]}],"versions":["1:6.0+dfsg-2expubuntu1","1:6.0+dfsg-2expubuntu2","1:6.0+dfsg-2expubuntu4"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-block-extra","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-guest-agent","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-arm","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-common","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-data","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-gui","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-mips","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-misc","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-ppc","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-s390x","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-sparc","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-x86","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-x86-microvm","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-system-x86-xen","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-user","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-user-binfmt","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-user-static","binary_version":"1:6.2+dfsg-2ubuntu5"},{"binary_name":"qemu-utils","binary_version":"1:6.2+dfsg-2ubuntu5"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3545.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}