Description
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2623-1 | qemu security update |
Debian DLA |
DLA-3362-1 | qemu security update |
EUVD |
EUVD-2021-26737 | The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. |
Ubuntu USN |
USN-5010-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T16:53:17.527Z
Reserved: 2021-02-12T00:00:00.000Z
Link: CVE-2021-3409
No data.
Status : Modified
Published: 2021-03-23T21:15:14.697
Modified: 2024-11-21T06:21:26.400
Link: CVE-2021-3409
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN