CVE-2020-25085

QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
References
Link Resource
http://www.openwall.com/lists/oss-security/2020/09/16/6 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/03/09/1 Mailing List Patch Third Party Advisory
https://bugs.launchpad.net/qemu/+bug/1892960 Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/11/msg00047.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html Mailing List Third Party Advisory
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html Mailing List Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20201009-0005/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:5.0.0:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Sep 2022, 16:06

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

05 Sep 2022, 06:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html -

15 Mar 2021, 22:07

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2021/03/09/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/03/09/1 - Mailing List, Patch, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/11/msg00047.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/11/msg00047.html - Mailing List, Third Party Advisory
References (MISC) https://bugs.launchpad.net/qemu/+bug/1892960 - Exploit, Patch, Third Party Advisory (MISC) https://bugs.launchpad.net/qemu/+bug/1892960 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20201009-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20201009-0005/ - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

09 Mar 2021, 16:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/03/09/1 -

Information

Published : 2020-09-25 05:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-25085

Mitre link : CVE-2020-25085

CVE.ORG link : CVE-2020-25085


JSON object : View

Products Affected

debian

  • debian_linux

qemu

  • qemu
CWE
CWE-787

Out-of-bounds Write