CVE-2021-3527 - log back

CVE-2021-3527 edited at 27 May 2021 09:44:34
References
https://bugzilla.redhat.com/show_bug.cgi?id=1955695
https://www.openwall.com/lists/oss-security/2021/05/07/1
- https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01373.html
+ https://gitlab.com/qemu-project/qemu/-/commit/7ec54f9eb62b5d177e30eb8b1cad795a5f8d8986
+ https://gitlab.com/qemu-project/qemu/-/commit/05a40b172e4d691371534828078be47e7fff524c
CVE-2021-3527 edited at 07 May 2021 16:48:14
References
https://bugzilla.redhat.com/show_bug.cgi?id=1955695
+ https://www.openwall.com/lists/oss-security/2021/05/07/1
- https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg00564.html
+ https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01373.html
CVE-2021-3527 edited at 04 May 2021 09:46:51
References
https://bugzilla.redhat.com/show_bug.cgi?id=1955695
+ https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg00564.html
CVE-2021-3527 edited at 01 May 2021 09:45:39
Severity
- Unknown
+ Low
Remote
- Unknown
+ Local
Type
- Unknown
+ Denial of service
Description
+ A security issue was found in the USB redirection support (usb-redir) of QEMU. More specifically, usb-host and usb-redirect try to batch bulk transfers by combining many small USB packets into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk sending is used in usbredir_handle_bulk_data() to dynamically allocate a variable length array (VLA) on the stack. Since the total size is not bounded, a malicious guest could be able to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
References
+ https://bugzilla.redhat.com/show_bug.cgi?id=1955695
CVE-2021-3527 created at 01 May 2021 09:44:56
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes