First published: Thu May 28 2020(Updated: )
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=5.0.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13361 is a vulnerability in QEMU 5.0.0 and earlier that allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
CVE-2020-13361 has a severity value of 3.9, indicating a high severity.
QEMU versions 5.0.0 and earlier, as well as specific versions of Ubuntu, Debian, openSUSE Leap, and Canonical Ubuntu Linux, are affected by CVE-2020-13361.
To fix CVE-2020-13361, it is recommended to update to the patched versions of QEMU, if available, provided by the respective vendors.
You can find more information about CVE-2020-13361 in the references provided: [http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html), [http://www.openwall.com/lists/oss-security/2020/05/28/1](http://www.openwall.com/lists/oss-security/2020/05/28/1), [https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html](https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html)