Description
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
References (7)
Core 7
Core References
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
Mailing List, Patch, Third Party Advisory x_refsource_confirm
http://www.openwall.com/lists/oss-security/2020/05/27/2
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1838546
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4467-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202011-09
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
Scores
CVSS v3
5.5
EPSS
0.0012
EPSS Percentile
29.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (6)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
20.04
debian/debian_linux
9.0
debian/debian_linux
10.0
qemu/qemu
< 5.0.1
Published
May 27, 2020
Tracked Since
Feb 18, 2026