CVE-2020-13362Out-of-bounds Read in Qemu

CWE-125Out-of-bounds Read13 documents9 sources
Severity
3.2LOWNVD
OSV6.5OSV5.5
EPSS
0.1%
top 73.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 28
Latest updateMay 24

Description

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:LExploitability: 1.5 | Impact: 1.4

Affected Packages4 packages

Debianqemu/qemu< 1:5.0-6+3
Ubuntuqemu/qemu< 1:2.5+dfsg-5ubuntu10.45+3
NVDqemu/qemu5.0.0
NVDopensuse/leap15.2

Also affects: Debian Linux 10.0, 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

5
GHSA
GHSA-75vw-6wgc-576c: In QEMU 42022-05-24
OSV
qemu vulnerabilities2021-02-02
OSV
qemu vulnerabilities2020-08-19
OSV
CVE-2020-13362: In QEMU 52020-05-28
CVEList
CVE-2020-13362: In QEMU 52020-05-28

📋Vendor Advisories

5
Ubuntu
QEMU vulnerabilities2021-02-02
Ubuntu
QEMU vulnerabilities2020-08-19
Microsoft
In QEMU 5.0.0 and earlier megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.2020-05-12
Red Hat
QEMU: megasas: OOB read access due to invalid index leads to DoS2020-05-07
Debian
CVE-2020-13362: qemu - In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-...2020

💬Community

2
Bugzilla
CVE-2020-13362 QEMU: megasas: OOB read access due to invalid index leads to DoS2020-05-28
Bugzilla
CVE-2020-13362 qemu: megasas: OOB read access due to invalid index leads to DoS [fedora-all]2020-05-28
CVE-2020-13362 — Out-of-bounds Read in Qemu | cvebase