CVE-2020-17380

Name
CVE-2020-17380
Description
A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1862167
Mailing List http://www.openwall.com/lists/oss-security/2021/03/09/1
Third Party Advisory https://security.netapp.com/advisory/ntap-20210312-0003/
MLIST https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None <= 5.0.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable