8.2
CVSSv3

CVE-2021-4206

Published: 29/04/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

It exists that QEMU incorrectly handled QXL display device emulation. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-4206, CVE-2021-4207)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

redhat enterprise linux 8.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Several security issues were fixed in QEMU ...
概述 Moderate: virt:av and virt-devel:av security and bug fix update 类型/严重性 Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 An update for the virt:av and virt-devel:av modules is now available for Red Hat Enterprise Linux A ...
概述 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update 类型/严重性 Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 An update for the virt:rhel and virt-devel:rhel modules is now available for Red ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or the execution of arbitrary code For the stable distribution (bullseye), this problem has been fixed in version 1:52+dfsg-11+deb11u2 We recommend that you upgrade your qemu packages For the detailed security status of qemu plea ...
A flaw was found in the QXL display device emulation in QEMU An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code withi ...