Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3409

Опубликовано: 23 мар. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 5.7

Описание

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

РелизСтатусПримечание
bionic

released

1:2.11+dfsg-1ubuntu7.37
devel

released

1:6.0+dfsg-1~ubuntu3
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

1:2.11+dfsg-1ubuntu7.37
esm-infra/focal

not-affected

1:4.2-3ubuntu6.17
esm-infra/xenial

needed

focal

released

1:4.2-3ubuntu6.17
groovy

released

1:5.0-5ubuntu9.9
hirsute

released

1:5.2+dfsg-9ubuntu3.1
impish

released

1:6.0+dfsg-1~ubuntu3

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

EPSS

Процентиль: 12%
0.00043
Низкий

4.6 Medium

CVSS2

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
redhat
больше 4 лет назад

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CVSS3: 5.7
nvd
около 4 лет назад

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CVSS3: 5.7
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 5.7
debian
около 4 лет назад

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffectiv ...

CVSS3: 5.7
github
около 3 лет назад

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

EPSS

Процентиль: 12%
0.00043
Низкий

4.6 Medium

CVSS2

5.7 Medium

CVSS3