qemu is vulnerable to arbitrary code execution. The vulnerability exists through a out-of-bounds read/write access flaw in the SDHCI Controller emulator of QEMU,hw/sd/sdhci.c
mishandles a write operation in the SDHC_BLKSIZE
case allows an attacker inside the guest could use this flaw to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host.
www.openwall.com/lists/oss-security/2020/09/16/6
www.openwall.com/lists/oss-security/2021/03/09/1
bugs.launchpad.net/qemu/+bug/1892960
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2020-25085
lists.debian.org/debian-lts-announce/2020/11/msg00047.html
lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html
security.netapp.com/advisory/ntap-20201009-0005/