CVE-2021-3682

HIGH

QEMU <6.1.0-rc2 - Code Execution

Title source: llm
STIX 2.1

Description

A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.

Scores

CVSS v3 8.5
EPSS 0.0045
EPSS Percentile 63.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-763
Status published
Products (6)
debian/debian_linux 9.0
debian/debian_linux 10.0
debian/debian_linux 11.0
qemu/qemu 6.1.0 rc1
qemu/qemu < 6.1.0
redhat/enterprise_linux 8.0 (2 CPE variants)
Published Aug 05, 2021
Tracked Since Feb 18, 2026