Vulnerability CVE-2020-1711: Information

Description

An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.

Severity: MEDIUM (6.0) Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

Published: Feb. 11, 2020
Modified: Nov. 7, 2023
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
qemusisyphus5.0.0-alt18.2.2-alt3ALT-PU-2020-1912-1250869Fixed
qemusisyphus_e2k7.2.0-alt3.E2K.37.2.0-alt3.E2K.4ALT-PU-2024-1953-1-Fixed
qemup105.0.0-alt18.2.2-alt0.p10.1ALT-PU-2020-1912-1250869Fixed
qemup10_e2k7.2.0-alt3.E2K.07.2.0-alt3.E2K.3ALT-PU-2023-6766-1-Fixed
qemup94.2.1-alt15.2.0-alt6ALT-PU-2020-2431-1254589Fixed
qemuc10f15.0.0-alt18.0.4-alt1.p10ALT-PU-2020-1912-1250869Fixed
qemuc9f24.2.1-alt15.2.0-alt6.c9.1ALT-PU-2020-2431-1254589Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711
  • Issue Tracking
  • Patch
  • Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/01/23/3
  • Mailing List
  • Third Party Advisory
https://lists.gnu.org/archive/html/qemu-devel/2020-01/msg05535.html
  • Mailing List
  • Patch
  • Third Party Advisory
USN-4283-1
  • Third Party Advisory
RHSA-2020:0669
  • Third Party Advisory
RHSA-2020:0730
  • Third Party Advisory
RHSA-2020:0731
  • Third Party Advisory
RHSA-2020:0773
  • Third Party Advisory
[debian-lts-announce] 20200316 [SECURITY] [DLA 2144-1] qemu security update
  • Third Party Advisory
openSUSE-SU-2020:0468
  • Third Party Advisory
GLSA-202005-02
  • Third Party Advisory
[debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
      Start including
      2.12.0
      End excliding
      4.2.1

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*