{
  "threat_severity" : "Moderate",
  "public_date" : "2020-11-18T00:00:00Z",
  "bugzilla" : {
    "description" : "QEMU: ide: atapi: OOB access while processing read commands",
    "id" : "1917446",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1917446"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-125",
  "details" : [ "ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.", "An out-of-bounds read-access flaw was found in the ATAPI Emulator of QEMU. This issue occurs while processing the ATAPI read command if the logical block address(LBA) is set to an invalid value. A guest user may use this flaw to crash the QEMU process on the host resulting in a denial of service." ],
  "acknowledgement" : "Red Hat would like to thank Wenxiang Qian (Tencent Blade Team) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Advanced Virtualization for RHEL 8.3.1",
    "release_date" : "2021-02-22T00:00:00Z",
    "advisory" : "RHBA-2021:0639",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.3::el8",
    "package" : "virt:8.3-8030120210211160750.71132145"
  }, {
    "product_name" : "Advanced Virtualization for RHEL 8.3.1",
    "release_date" : "2021-02-22T00:00:00Z",
    "advisory" : "RHBA-2021:0639",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.3::el8",
    "package" : "virt-devel:8.3-8030120210211160750.71132145"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2021-06-08T00:00:00Z",
    "advisory" : "RHSA-2021:2322",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-175.el7_9.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-05-18T00:00:00Z",
    "advisory" : "RHSA-2021:1762",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt-devel:rhel-8040020210317013608.9f9e2e7e"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-05-18T00:00:00Z",
    "advisory" : "RHSA-2021:1762",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt:rhel-8040020210317013608.9f9e2e7e"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2021-06-23T00:00:00Z",
    "advisory" : "RHSA-2021:2529",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.12.0-48.el7_9.3"
  }, {
    "product_name" : "Red Hat Virtualization Engine 4.3",
    "release_date" : "2021-06-23T00:00:00Z",
    "advisory" : "RHSA-2021:2529",
    "cpe" : "cpe:/a:redhat:rhev_manager:4.3",
    "package" : "qemu-kvm-rhev-10:2.12.0-48.el7_9.3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-ma",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8 Advanced Virtualization",
    "fix_state" : "Will not fix",
    "package_name" : "virt:8.3/qemu-kvm",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8::el8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-29443\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-29443\nhttps://www.openwall.com/lists/oss-security/2021/01/18/2" ],
  "name" : "CVE-2020-29443",
  "csaw" : false
}