A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qemu | Qemu | * | 7.0.0 (excluding) |
Advanced Virtualization for RHEL 8.4.0.EUS | RedHat | virt:av-8040020220517095834.522a0ee4 | * |
Advanced Virtualization for RHEL 8.4.0.EUS | RedHat | virt-devel:av-8040020220517095834.522a0ee4 | * |
Red Hat Enterprise Linux 8 | RedHat | virt-devel:rhel-8060020220616155742.ad008a3a | * |
Red Hat Enterprise Linux 8 | RedHat | virt:rhel-8060020220616155742.ad008a3a | * |
Qemu | Ubuntu | bionic | * |
Qemu | Ubuntu | devel | * |
Qemu | Ubuntu | esm-infra/bionic | * |
Qemu | Ubuntu | esm-infra/focal | * |
Qemu | Ubuntu | focal | * |
Qemu | Ubuntu | impish | * |
Qemu | Ubuntu | jammy | * |
Qemu | Ubuntu | kinetic | * |
Qemu | Ubuntu | lunar | * |
Qemu | Ubuntu | mantic | * |
Qemu | Ubuntu | noble | * |
Qemu | Ubuntu | oracular | * |
Qemu | Ubuntu | plucky | * |
Qemu | Ubuntu | trusty | * |
Qemu | Ubuntu | trusty/esm | * |
Qemu | Ubuntu | xenial | * |