4.4
CVSSv2

CVE-2020-25085

Published: 25/09/2020 Updated: 23/09/2022
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 5 | Impact Score: 3.7 | Exploitability Score: 0.8
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 5.0.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #970540 CVE-2020-25085 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 18 Sep 2020 09:15:03 UTC Severity: important Tags: upstream F ...

Mailing Lists

Hello, QEMU upstream commit [1] was supposed to fix CVE-2020-17380 and CVE-2020-25085, both involving a heap buffer overflow in the SDHCI controller emulation code In fact, commit [1] turned out to be incomplete, in that it was still possible to reproduce the same issue(s) with specially crafted input, inducing a bogus transfer and subsequent out ...
Hello, Upstream patches: ----------------- -> listsnongnuorg/archive/html/qemu-devel/2020-09/msg00733html -> listsnongnuorg/archive/html/qemu-devel/2020-09/msg01439html * This issue was reported by Sergej Schumilo, Cornelius Aschermann, Simon Wrner of Ruhr-University Bochum * 'CVE-2020-25085' assigned via htt ...