A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3099-1 | qemu security update |
Debian DSA |
DSA-5133-1 | qemu security update |
EUVD |
EUVD-2021-34064 | A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. |
Ubuntu USN |
USN-5489-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 21 Mar 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-21T18:03:39.948Z
Reserved: 2022-01-13T00:00:00.000Z
Link: CVE-2021-4206
No data.
Status : Modified
Published: 2022-04-29T17:15:20.023
Modified: 2025-03-21T18:15:27.497
Link: CVE-2021-4206
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN