Unrated severityNVD Advisory· Published Sep 25, 2020· Updated Aug 4, 2024
CVE-2020-25085
CVE-2020-25085
Description
QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
Affected products
22- QEMU/QEMUdescription
- osv-coords21 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/qemu&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qemu-linux-user&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/qemu-testsuite&distro=openSUSE%20Leap%2015.2pkg:rpm/suse/qemu&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/qemu&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/qemu&distro=SUSE%20Manager%20Server%204.0
< 4.2.1-lp152.9.16.2+ 20 more
- (no CPE)range: < 4.2.1-lp152.9.16.2
- (no CPE)range: < 5.2.0-17.1
- (no CPE)range: < 6.1.0-32.1
- (no CPE)range: < 4.2.1-lp152.9.16.1
- (no CPE)range: < 4.2.1-lp152.9.16.7
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 4.2.1-11.19.2
- (no CPE)range: < 4.2.1-11.19.2
- (no CPE)range: < 5.2.0-17.1
- (no CPE)range: < 4.2.1-11.19.2
- (no CPE)range: < 5.2.0-17.1
- (no CPE)range: < 3.1.1.1-51.1
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-51.1
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
- (no CPE)range: < 3.1.1.1-9.30.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.openwall.com/lists/oss-security/2020/09/16/6mitrex_refsource_CONFIRM
- www.openwall.com/lists/oss-security/2021/03/09/1mitremailing-listx_refsource_MLIST
- bugs.launchpad.net/qemu/+bug/1892960mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2020/11/msg00047.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2022/09/msg00008.htmlmitremailing-listx_refsource_MLIST
- lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.htmlmitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20201009-0005/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.