First published: Tue Jan 04 2022(Updated: )
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <7.0.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/qemu-kvm | <7.0.0 | 7.0.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-4207.
CVE-2021-4207 has a severity rating of 8.2 (high).
QEMU qemu, Redhat Enterprise Linux (8.0), Debian Debian Linux (10.0, 11.0), and Ubuntu qemu (kinetic, lunar, bionic, focal, impish, jammy, mantic) are affected by CVE-2021-4207.
CVE-2021-4207 is a flaw in the QXL display device emulation in QEMU that can lead to a heap-based buffer overflow.
To fix CVE-2021-4207, update to version 7.0.0 of qemu-kvm (for Redhat) or update to the latest version of QEMU qemu, Redhat Enterprise Linux, Debian Debian Linux, or Ubuntu qemu.