First published: Fri Jan 22 2021(Updated: )
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =5.2.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
debian/qemu | <=1:5.2+dfsg-11+deb11u2 | 1:5.2+dfsg-11+deb11u3 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 1:9.2.1+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this QEMU vulnerability is CVE-2021-20196.
The severity level of the QEMU vulnerability CVE-2021-20196 is medium with a CVSS score of 6.5.
The QEMU vulnerability CVE-2021-20196 occurs due to a NULL pointer dereference flaw in the floppy disk emulator.
The affected software versions of the QEMU vulnerability CVE-2021-20196 are QEMU 5.2.0, Debian Debian Linux 9.0, and Debian Debian Linux 10.0.
Yes, there are fixes available for the QEMU vulnerability CVE-2021-20196. Please refer to the provided references for more information.