First published: Tue Jan 26 2016(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.5.1.1 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2197 is a vulnerability in QEMU that allows a privileged user inside the guest to crash the QEMU process.
CVE-2016-2197 occurs due to a null pointer dereference flaw while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries in QEMU with IDE AHCI emulation support.
The severity of CVE-2016-2197 is medium with a CVSS score of 5.5 (out of 10).
QEMU versions 1:2.3+dfsg-5ubuntu9.2 (Ubuntu wily) up to inclusive version 2.5.1.1 (QEMU qemu) are affected. There are also multiple affected versions in Debian.
To fix CVE-2016-2197, update QEMU to the recommended versions: 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, or 1:8.1.2+ds-1.