CVE-2020-1711
Summary
| CVE | CVE-2020-1711 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-11 20:15:00 UTC |
| Updated | 2023-11-07 03:19:00 UTC |
| Description | An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [PATCH] iscsi: Cap block count from GET LBA STATUS (CVE-2020-1711) |
MISC |
lists.gnu.org |
Mailing List, Patch, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| QEMU: Multiple vulnerabilities (GLSA 202005-02) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| USN-4283-1: QEMU vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| oss-security - CVE-2020-1711 QEMU: block: iscsi: OOB heap access via an unexpected
response of iSCSI Server |
MISC |
www.openwall.com |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| 1794290 – (CVE-2020-1711) CVE-2020-1711 QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 2144-1] qemu security update |
MLIST |
lists.debian.org |
Third Party Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
REDHAT |
access.redhat.com |
Third Party Advisory |
| [SECURITY] [DLA 2373-1] qemu security update |
MLIST |
lists.debian.org |
|
| [security-announce] openSUSE-SU-2020:0468-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 377413 Alibaba Cloud Linux Security Update for virt:rhel and virt-devel:rhel (ALINUX3-SA-2022:0119)
- 900050 CBL-Mariner Linux Security Update for qemu-kvm 4.2.0
- 903618 Common Base Linux Mariner (CBL-Mariner) Security Update for qemu-kvm (1959)
- 940144 AlmaLinux Security Update for virt:rhel (ALSA-2020:1358)
- 960718 Rocky Linux Security Update for virt:rhel (RLSA-2020:1358)