CVE-2021-3409

Beschreibung:
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.

CWE: CWE-119

CVSS-Bewertung
CVSS 2: MEDIUM – 4.6 (Version: 2.0)
CVSS 3: MEDIUM – 5.7 (Version: 3.1)

Links:

NVD – CVE-2021-3409
CVE – CVE-2021-3409

Link (max. 20) Quelle Tags
https://www.openwall.com/lists/oss-security/2021/03/09/1 MISC Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1928146 MISC Issue Tracking Patch Third Party Advisory
[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update MLIST Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0001/ CONFIRM Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0006/ CONFIRM Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc MISC Third Party Advisory
[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
GLSA-202103-03 GENTOO Third Party Advisory
https://www.tenable.com/security/tns-2021-06 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-05 CONFIRM Third Party Advisory
FEDORA-2021-cbf14ab8f9 FEDORA Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10356 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-09 CONFIRM

Quelle: NVD – CVE-2021-3409
Datum Veröffentlichung: 2021-03-23T21:15Z, Datum letzte Änderung: 2021-05-07T05:15Z