Description
A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2623-1 | qemu security update |
Debian DLA |
DLA-3362-1 | qemu security update |
EUVD |
EUVD-2020-9333 | A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host. |
Ubuntu USN |
USN-4650-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:53:16.506Z
Reserved: 2020-08-07T00:00:00.000Z
Link: CVE-2020-17380
No data.
Status : Modified
Published: 2021-01-30T06:15:12.647
Modified: 2024-11-21T05:07:58.440
Link: CVE-2020-17380
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN