Vulnerability CVE-2020-13253: Information

Description

sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

Severity: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Published: May 27, 2020
Modified: Sept. 23, 2022
Error type identifier: CWE-125

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
qemusisyphus5.1.0-alt18.2.2-alt3ALT-PU-2020-2595-1256281Fixed
qemusisyphus_e2k7.2.0-alt3.E2K.37.2.0-alt3.E2K.4ALT-PU-2024-1953-1-Fixed
qemup105.1.0-alt18.2.2-alt0.p10.1ALT-PU-2020-2595-1256281Fixed
qemup10_e2k7.2.0-alt3.E2K.07.2.0-alt3.E2K.3ALT-PU-2023-6766-1-Fixed
qemup95.2.0-alt65.2.0-alt6ALT-PU-2021-1880-1270488Fixed
qemuc10f15.1.0-alt18.0.4-alt1.p10ALT-PU-2020-2595-1256281Fixed
qemuc9f25.2.0-alt65.2.0-alt6.c9.1ALT-PU-2021-1964-1273330Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
http://www.openwall.com/lists/oss-security/2020/05/27/2
  • Mailing List
  • Patch
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1838546
  • Issue Tracking
  • Patch
  • Third Party Advisory
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
  • Mailing List
  • Patch
  • Third Party Advisory
USN-4467-1
  • Third Party Advisory
[debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
  • Mailing List
  • Third Party Advisory
GLSA-202011-09
  • Third Party Advisory
[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
      End including
      5.0.1

      Configuration 2

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*