CVE-2021-4207

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Race Condition
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.2 HIGH
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
VendorProductVersion
qemuqemu
𝑥
< 7.0.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
noble
Fixed 1:6.2+dfsg-2ubuntu8
released
mantic
Fixed 1:6.2+dfsg-2ubuntu8
released
lunar
Fixed 1:6.2+dfsg-2ubuntu8
released
kinetic
Fixed 1:6.2+dfsg-2ubuntu8
released
jammy
Fixed 1:6.2+dfsg-2ubuntu6.2
released
impish
Fixed 1:6.0+dfsg-2expubuntu1.3
released
focal
Fixed 1:4.2-3ubuntu6.23
released
bionic
Fixed 1:2.11+dfsg-1ubuntu7.40
released
xenial
needs-triage
trusty
needs-triage