rpm package
suse/qemu&distro=SUSE Linux Enterprise Real Time 15 SP2
pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-20196 | — | < 4.2.1-11.34.2 | 4.2.1-11.34.2 | May 26, 2021 | A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on | ||
| CVE-2020-13253 | — | < 4.2.1-11.34.2 | 4.2.1-11.34.2 | May 27, 2020 | sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. |
- CVE-2021-20196May 26, 2021affected < 4.2.1-11.34.2fixed 4.2.1-11.34.2
A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on
- CVE-2020-13253May 27, 2020affected < 4.2.1-11.34.2fixed 4.2.1-11.34.2
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.