A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2022-04-29T16:07:33

Updated: 2022-09-05T05:06:11

Reserved: 2022-01-13T00:00:00


Link: CVE-2021-4207

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-04-29T17:15:20.100

Modified: 2023-11-07T03:40:22.577


Link: CVE-2021-4207

JSON object: View

cve-icon Redhat Information

No data.