CVE-2021-3682
05.08.2021, 20:15
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.Enginsight
| Vendor | Product | Version |
|---|---|---|
| qemu | qemu | 𝑥 < 6.1.0 |
| qemu | qemu | 6.1.0:rc1 |
| redhat | enterprise_linux | 8.0 |
| redhat | enterprise_linux | 8.0 |
| debian | debian_linux | 9.0 |
| debian | debian_linux | 10.0 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| qemu |
|
Common Weakness Enumeration
References