First published: Mon Apr 19 2021(Updated: )
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=6.0.0 | |
Debian Debian Linux | =10.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
debian/qemu | <=1:5.2+dfsg-11+deb11u2 | 1:5.2+dfsg-11+deb11u3 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3507.
This heap buffer overflow vulnerability exists in QEMU up to version 6.0.0 (including).
CVE-2021-3507 has a severity rating of 6.1 (Medium).
This heap buffer overflow vulnerability in QEMU could allow a privileged guest user to crash the QEMU process.
Yes, you can find more information about available remedies or fixes for CVE-2021-3507 in the provided references.