Description
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
References (6)
Scores
CVSS v3
8.5
EPSS
0.0045
EPSS Percentile
63.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-763
Status
published
Products (6)
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
qemu/qemu
6.1.0 rc1
qemu/qemu
< 6.1.0
redhat/enterprise_linux
8.0 (2 CPE variants)
Published
Aug 05, 2021
Tracked Since
Feb 18, 2026