First published: Mon Apr 19 2021(Updated: )
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1951118 is critical due to the potential for a privileged guest user to exploit the heap buffer overflow.
To fix REDHAT-BUG-1951118, update QEMU to a version higher than 6.0.0.
Users running QEMU versions up to and including 6.0.0 are affected by REDHAT-BUG-1951118.
REDHAT-BUG-1951118 is classified as a heap buffer overflow vulnerability.
No, REDHAT-BUG-1951118 requires a local privileged guest user to exploit the vulnerability.