Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-4207

Опубликовано: 28 мар. 2022
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values cursor->header.width and cursor->header.height can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

Отчет

Releases of Red Hat OpenStack Platform 15 and newer consume fixes directly from the Red Hat Enterprise Linux 8 Advanced Virtualization repository. A future update may address this issue in Red Hat Enterprise Linux 8 and RHEL 8 Advanced Virtualization. The versions of qemu-kvm as shipped with Red Hat Enterprise Linux 9 are not affected by this flaw as they do not include support for QXL display device emulation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qemu-kvmOut of support scope
Red Hat Enterprise Linux 7qemu-kvmOut of support scope
Red Hat Enterprise Linux 7qemu-kvm-maOut of support scope
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:8.2/qemu-kvmWill not fix
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:av/qemu-kvmAffected
Red Hat Enterprise Linux 9qemu-kvmNot affected
Red Hat OpenStack Platform 10 (Newton)qemu-kvm-rhevOut of support scope
Red Hat OpenStack Platform 13 (Queens)qemu-kvm-rhevOut of support scope
Advanced Virtualization for RHEL 8.4.0.EUSvirtFixedRHSA-2022:500213.06.2022
Advanced Virtualization for RHEL 8.4.0.EUSvirt-develFixedRHSA-2022:500213.06.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-362->CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2036966QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow

EPSS

Процентиль: 12%
0.0004
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
около 3 лет назад

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVSS3: 8.2
nvd
около 3 лет назад

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVSS3: 8.2
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 8.2
debian
около 3 лет назад

A flaw was found in the QXL display device emulation in QEMU. A double ...

CVSS3: 8.8
github
около 3 лет назад

A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

EPSS

Процентиль: 12%
0.0004
Низкий

7.5 High

CVSS3