First published: Tue Jan 04 2022(Updated: )
A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <7.0.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/qemu-kvm | <7.0.0 | 7.0.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4206 is a vulnerability found in the QXL display device emulation in QEMU.
The severity of CVE-2021-4206 is high with a CVSS score of 8.2.
CVE-2021-4206 impacts Redhat Enterprise Linux 8.0.
To fix CVE-2021-4206, update the affected software to version 7.0.0 or higher.
You can find more information about CVE-2021-4206 at the following references: [1](https://bugzilla.redhat.com/show_bug.cgi?id=2036998), [2](https://starlabs.sg/advisories/21-4206/), [3](https://www.debian.org/security/2022/dsa-5133).