CVE-2020-29443

Name
CVE-2020-29443
Description
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg04685.html
Mailing List http://www.openwall.com/lists/oss-security/2021/01/18/2
Mailing List https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20210304-0003/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:5.1.0:-:*:*:*:*:*:* qemu == None == 5.1.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu edge-community 5.2.0-r0 None fixed
qemu edge-community 5.1.0-r1 None possibly vulnerable
qemu 3.22-community 5.2.0-r0 None fixed
qemu 3.22-community 5.1.0-r1 None possibly vulnerable
qemu 3.21-community 5.2.0-r0 None fixed
qemu 3.20-community 5.2.0-r0 None fixed
qemu 3.19-community 5.2.0-r0 None fixed
qemu 3.18-community 5.2.0-r0 None fixed
qemu 3.17-community 5.2.0-r0 None fixed