CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
EPSS
Percentile
25.3%
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective,
thus making QEMU vulnerable to the out-of-bounds read/write access issues
previously found in the SDHCI controller emulation code. This flaw allows a
malicious privileged guest to crash the QEMU process on the host, resulting
in a denial of service or potential code execution. QEMU up to (including)
5.2.0 is affected by this.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | qemu | < 1:2.11+dfsg-1ubuntu7.37 | UNKNOWN |
ubuntu | 20.04 | noarch | qemu | < 1:4.2-3ubuntu6.17 | UNKNOWN |
ubuntu | 20.10 | noarch | qemu | < 1:5.0-5ubuntu9.9 | UNKNOWN |
ubuntu | 21.04 | noarch | qemu | < 1:5.2+dfsg-9ubuntu3.1 | UNKNOWN |
ubuntu | 21.10 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
ubuntu | 22.04 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
ubuntu | 22.10 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
ubuntu | 23.04 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
ubuntu | 23.10 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
ubuntu | 24.04 | noarch | qemu | < 1:6.0+dfsg-1~ubuntu3 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-3409
lists.nongnu.org/archive/html/qemu-devel/2021-02/msg02910.html
lists.nongnu.org/archive/html/qemu-devel/2021-02/msg03102.html
nvd.nist.gov/vuln/detail/CVE-2021-3409
security-tracker.debian.org/tracker/CVE-2021-3409
ubuntu.com/security/notices/USN-5010-1
www.cve.org/CVERecord?id=CVE-2021-3409
www.openwall.com/lists/oss-security/2021/03/09/1
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
EPSS
Percentile
25.3%