CVE-2020-13754

Name
CVE-2020-13754
Description
hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List http://www.openwall.com/lists/oss-security/2020/06/01/6
Issue Tracking https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20200608-0007/
Mailing List http://www.openwall.com/lists/oss-security/2020/06/15/8
Third Party Advisory https://www.debian.org/security/2020/dsa-4728
Mailing List https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
Third Party Advisory https://usn.ubuntu.com/4467-1/
Third Party Advisory https://security.gentoo.org/glsa/202011-09

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None <= 5.0.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable