CVE-2021-3409 PUBLISHED

The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

EPSS 0.05% · 16.7th percentile

Risk Scores

EPSS Score
0.05%
16.7th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSqemu1:2.10+dfsg-0ubuntu3, 1:2.11+dfsg-1ubuntu7.19, 1:2.11+dfsg-1ubuntu7.18
Ubuntu:20.04:LTSqemu1:4.2-3ubuntu6.16, 1:4.2-3ubuntu6.15, 1:4.2-3ubuntu6.14
Ubuntu:Pro:16.04:LTSqemu1:2.5+dfsg-5ubuntu10.43, 0, 1:2.3+dfsg-5ubuntu9
Ubuntu:Pro:14.04:LTSqemu1.7.0+dfsg-2ubuntu1, 1.6.0+dfsg-2ubuntu4, 1.6.0+dfsg-2ubuntu3

Timeline

References

Open in Interactive Console →