Описание
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
The patch for CVE-2020-17380 and CVE-2020-25085, both involving a heap buffer overflow in the SDHCI controller emulation code of QEMU, was found to be incomplete. A malicious privileged guest could reproduce the same issues with specially crafted input, inducing a bogus transfer and subsequent out-of-bounds read/write access in sdhci_do_adma() or sdhci_sdma_transfer_multi_blocks(). CVE-2021-3409 was assigned to facilitate the tracking and backporting of the new patch.
Отчет
This flaw does not affect the versions of qemu-kvm
as shipped with Red Hat products, as they do not include support for SDHCI device emulation.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Not affected | ||
Red Hat Enterprise Linux 5 | xen | Not affected | ||
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm-ma | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm-rhev | Not affected | ||
Red Hat Enterprise Linux 8 | virt:rhel/qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.1/qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.2/qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.3/qemu-kvm | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.7 Medium
CVSS3
Связанные уязвимости
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffectiv ...
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
EPSS
5.7 Medium
CVSS3