CVE-2021-4207

Name
CVE-2021-4207
Description
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://starlabs.sg/advisories/21-4207/
MISC https://bugzilla.redhat.com/show_bug.cgi?id=2036966
Third Party Advisory https://www.debian.org/security/2022/dsa-5133

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None < 7.0.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.15-community 6.1.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable