CVE-2021-3682
05.08.2021, 20:15
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 < 6.1.0 |
qemu | qemu | 6.1.0:rc1 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
|
Common Weakness Enumeration
References