First published: Tue Feb 09 2021(Updated: )
A flaw was found in QEMU in the way it handles a list of open file descriptors. Improper synchronization of this list can lead to a use-after-free. Reference: <a href="https://bugs.launchpad.net/qemu/+bug/1911666">https://bugs.launchpad.net/qemu/+bug/1911666</a> Upstream patch: <a href="https://git.qemu.org/?p=qemu.git;a=commit;h=89fbea8737e8f7b954745a1ffc4238d377055305">https://git.qemu.org/?p=qemu.git;a=commit;h=89fbea8737e8f7b954745a1ffc4238d377055305</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=5.2.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
QEMU qemu | ||
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20181 is a vulnerability in QEMU that allows local attackers to execute arbitrary code on affected installations.
CVE-2021-20181 has a severity rating of 7.5 (High).
QEMU versions up to and including 5.2.0 are affected. Additionally, Debian Linux versions 9.0 and 10.0 are affected as well.
To exploit CVE-2021-20181, an attacker must first obtain the ability to execute high-privileged code on the target guest system.
Yes, fixes for CVE-2021-20181 are available. Please refer to the relevant vendor or distribution for the specific fixes.