3.3
CVSSv2

CVE-2020-29443

Published: 26/01/2021 Updated: 30/09/2022
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 3.9 | Impact Score: 2.7 | Exploitability Score: 0.8
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 5.1.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #983575 CVE-2020-29443 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 26 Feb 2021 16:27:01 UTC Severity: important Tags: security, u ...
A heap buffer overflow flaw was found in the iSCSI support of QEMU This flaw could lead to an out-of-bounds read access and possible information disclosure from the QEMU process memory to a malicious guest The highest threat from this vulnerability is to data confidentiality (CVE-2020-11947) An infinite loop flaw was found in the e1000e NIC emul ...
An out-of-bounds read access issue was found in the ATAPI Emulator of QEMU It occurs while processing ATAPI read command if logical block address(LBA) is set an invalid value A guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-29443 QEMU: ide: atapi: OOB access while processing read commands <!--X-Subject-Header-End--> <!--X-Head-of-Message-- ...