CVE-2020-13253

Name
CVE-2020-13253
Description
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List http://www.openwall.com/lists/oss-security/2020/05/27/2
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1838546
Mailing List https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
Third Party Advisory https://usn.ubuntu.com/4467-1/
Mailing List https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html
Third Party Advisory https://security.gentoo.org/glsa/202011-09

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None <= 5.0.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable