8.2
CVSSv3

CVE-2021-4207

Published: 29/04/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

It exists that QEMU incorrectly handled QXL display device emulation. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-4206, CVE-2021-4207)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

redhat enterprise linux 8.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Several security issues were fixed in QEMU ...
概述 Moderate: virt:av and virt-devel:av security and bug fix update 类型/严重性 Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 An update for the virt:av and virt-devel:av modules is now available for Red Hat Enterprise Linux A ...
概述 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update 类型/严重性 Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 An update for the virt:rhel and virt-devel:rhel modules is now available for Red ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or the execution of arbitrary code For the stable distribution (bullseye), this problem has been fixed in version 1:52+dfsg-11+deb11u2 We recommend that you upgrade your qemu packages For the detailed security status of qemu plea ...
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service The highest threat from th ...
A flaw was found in the QXL display device emulation in QEMU A double fetch of guest controlled values `cursor->headerwidth` and `cursor->headerheight` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow A malicious privileged guest user could use this flaw to crash the QEMU proc ...