First published: Fri Feb 12 2021(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=5.2.0 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3409 is a vulnerability in QEMU that allows a malicious guest to crash the QEMU process on the host.
QEMU versions up to and including 5.2.0, Red Hat Enterprise Linux 7.0, Fedora 33, Debian Debian Linux 9.0, and various versions of Ubuntu are affected by CVE-2021-3409.
CVE-2021-3409 has a severity rating of 5.7, which is classified as medium.
To fix CVE-2021-3409, it is recommended to update to the latest version of QEMU or apply the relevant patches provided by the software vendor.
More information about CVE-2021-3409 can be found at the following references: [Link 1](https://access.redhat.com/security/cve/CVE-2020-17380), [Link 2](https://access.redhat.com/security/cve/CVE-2020-25085), [Link 3](https://git.qemu.org/?p=qemu.git;a=commit;h=dfba99f17feb6d4a129da19d38df1bcd8579d1c3).