5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
qemu is vulnerable to arbitrary code execution. The vulnerability exists through a out-of-bounds read/write access flaw in the SDHCI Controller emulator of QEMU,hw/sd/sdhci.c
mishandles a write operation in the SDHC_BLKSIZE
case allows an attacker inside the guest could use this flaw to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host.
www.openwall.com/lists/oss-security/2020/09/16/6
www.openwall.com/lists/oss-security/2021/03/09/1
bugs.launchpad.net/qemu/+bug/1892960
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2020-25085
lists.debian.org/debian-lts-announce/2020/11/msg00047.html
lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html
security.netapp.com/advisory/ntap-20201009-0005/
5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P