Vulnerability CVE-2020-13253: Information
Description
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
Severity: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
qemu | sisyphus | 5.1.0-alt1 | 8.2.2-alt3 | ALT-PU-2020-2595-1 | 256281 | Fixed |
qemu | sisyphus_e2k | 7.2.0-alt3.E2K.3 | 7.2.0-alt3.E2K.4 | ALT-PU-2024-1953-1 | - | Fixed |
qemu | p10 | 5.1.0-alt1 | 8.2.2-alt0.p10.1 | ALT-PU-2020-2595-1 | 256281 | Fixed |
qemu | p10_e2k | 7.2.0-alt3.E2K.0 | 7.2.0-alt3.E2K.3 | ALT-PU-2023-6766-1 | - | Fixed |
qemu | p9 | 5.2.0-alt6 | 5.2.0-alt6 | ALT-PU-2021-1880-1 | 270488 | Fixed |
qemu | c10f1 | 5.1.0-alt1 | 8.0.4-alt1.p10 | ALT-PU-2020-2595-1 | 256281 | Fixed |
qemu | c9f2 | 5.2.0-alt6 | 5.2.0-alt6.c9.1 | ALT-PU-2021-1964-1 | 273330 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/05/27/2 |
|
https://bugzilla.redhat.com/show_bug.cgi?id=1838546 |
|
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html |
|
USN-4467-1 |
|
[debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update |
|
GLSA-202011-09 |
|
[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update |
|