Unrated severityNVD Advisory· Published Apr 29, 2022· Updated Mar 21, 2025
CVE-2021-4207
CVE-2021-4207
Description
A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values cursor->header.width and cursor->header.height can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- security.gentoo.org/glsa/202208-27mitrevendor-advisoryx_refsource_GENTOO
- www.debian.org/security/2022/dsa-5133mitrevendor-advisoryx_refsource_DEBIAN
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2022/09/msg00008.htmlmitremailing-listx_refsource_MLIST
- starlabs.sg/advisories/21-4207/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.