First published: Mon Apr 27 2020(Updated: )
An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | >=4.0.1<=4.2.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.1.1+ds-2 1:9.1.1+ds-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11869 is an integer overflow vulnerability found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation.
CVE-2020-11869 affects QEMU versions 4.0.1 through 4.2.0.
The severity of CVE-2020-11869 is rated as low with a CVSS score of 3.3.
CVE-2020-11869 could allow a malicious guest to crash the QEMU process or potentially execute arbitrary code.
To fix CVE-2020-11869, it is recommended to update QEMU to version 4.2.0 or higher, or apply the necessary patches provided by the vendor.