{"id":"UBUNTU-CVE-2021-3607","details":"An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.","modified":"2026-02-04T03:06:46.188270Z","published":"2021-06-18T00:00:00Z","related":["USN-5010-1"],"upstream":["CVE-2021-3607"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3607"},{"type":"REPORT","url":"https://lists.gnu.org/archive/html/qemu-devel/2021-06/msg07925.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5010-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-3607"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:4.2-3ubuntu6.17?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2-3ubuntu6.17"}]}],"versions":["1:4.0+dfsg-0ubuntu9","1:4.0+dfsg-0ubuntu10","1:4.2-1ubuntu1","1:4.2-1ubuntu2","1:4.2-3ubuntu1","1:4.2-3ubuntu2","1:4.2-3ubuntu3","1:4.2-3ubuntu4","1:4.2-3ubuntu5","1:4.2-3ubuntu6","1:4.2-3ubuntu6.1","1:4.2-3ubuntu6.2","1:4.2-3ubuntu6.3","1:4.2-3ubuntu6.4","1:4.2-3ubuntu6.5","1:4.2-3ubuntu6.6","1:4.2-3ubuntu6.7","1:4.2-3ubuntu6.8","1:4.2-3ubuntu6.9","1:4.2-3ubuntu6.10","1:4.2-3ubuntu6.11","1:4.2-3ubuntu6.12","1:4.2-3ubuntu6.14","1:4.2-3ubuntu6.15","1:4.2-3ubuntu6.16"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-block-extra"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-guest-agent"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-kvm"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-arm"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-common"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-data"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-gui"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-mips"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-misc"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-ppc"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-s390x"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-sparc"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-x86"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-x86-microvm"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-system-x86-xen"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-user"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-user-binfmt"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-user-static"},{"binary_version":"1:4.2-3ubuntu6.17","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3607.json"}},{"package":{"name":"qemu","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:6.0+dfsg-2expubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:6.0+dfsg-2expubuntu1"}]}],"ecosystem_specific":{"binaries":[{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-block-extra"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-guest-agent"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-arm"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-common"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-data"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-gui"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-mips"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-misc"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-ppc"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-s390x"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-sparc"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-x86"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-x86-microvm"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-system-x86-xen"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-user"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-user-binfmt"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-user-static"},{"binary_version":"1:6.0+dfsg-2expubuntu1","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-3607.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}