CVE-2020-13253
Summary
| CVE | CVE-2020-13253 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-27 15:15:00 UTC |
| Updated | 2022-09-23 15:29:00 UTC |
| Description | sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [PATCH 1/2] sd: check bit number before setting card_status flag |
MISC |
lists.gnu.org |
Mailing List, Patch, Third Party Advisory |
| 1838546 – (CVE-2020-13253) CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting in DoS |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 3099-1] qemu security update |
MLIST |
lists.debian.org |
|
| QEMU: Multiple vulnerabilities (GLSA 202011-09) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| USN-4467-1: QEMU vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| oss-security - CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting
in DoS |
CONFIRM |
www.openwall.com |
Mailing List, Patch, Third Party Advisory |
| [SECURITY] [DLA 2373-1] qemu security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 180995 Debian Security Update for qemu (DLA 3099-1)
- 751671 OpenSUSE Security Update for qemu (openSUSE-SU-2022:0210-1)
- 751742 OpenSUSE Security Update for qemu (openSUSE-SU-2022:0210-2)
- 753802 SUSE Enterprise Linux Security Update for qemu (SUSE-SU-2023:0761-1)
- 900187 CBL-Mariner Linux Security Update for qemu-kvm 4.2.0
- 903305 Common Base Linux Mariner (CBL-Mariner) Security Update for qemu-kvm (1966)