CVE-2021-4207

EUVD-2021-34065
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Race Condition
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.2 HIGH
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
Affected Products (NVD)
VendorProductVersion
qemuqemu
𝑥
< 7.0.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bookworm
1:7.2+dfsg-7+deb12u7
fixed
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
bionic
Fixed 1:2.11+dfsg-1ubuntu7.40
released
focal
Fixed 1:4.2-3ubuntu6.23
released
impish
Fixed 1:6.0+dfsg-2expubuntu1.3
released
jammy
Fixed 1:6.2+dfsg-2ubuntu6.2
released
kinetic
Fixed 1:6.2+dfsg-2ubuntu8
released
lunar
Fixed 1:6.2+dfsg-2ubuntu8
released
mantic
Fixed 1:6.2+dfsg-2ubuntu8
released
noble
Fixed 1:6.2+dfsg-2ubuntu8
released
trusty
needs-triage
xenial
needs-triage