First published: Mon Jun 01 2020(Updated: )
An OOB access issue was found in the Message Signalled Interrupt (MSI-X) device support of QEMU. It could occur while performing MSI-X mmio operations when a guest sent address goes beyond the mmio region. A guest user/process may use this flaw to crash the QEMU process resulting in DoS scenario. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg03732.html">https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg03732.html</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2020/06/01/6">https://www.openwall.com/lists/oss-security/2020/06/01/6</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=5.0.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
redhat/QEMU | <5.0.1 | 5.0.1 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13754 is a vulnerability in QEMU 4.2.0 that allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.
You are affected by CVE-2020-13754 if you are using QEMU 4.2.0.
The severity of CVE-2020-13754 is medium (6.7).
To fix CVE-2020-13754 in Red Hat, you need to update QEMU to version 5.0.1.
To fix CVE-2020-13754 in Ubuntu, you need to update QEMU to the specified versions: 1:2.5+dfsg-5ubuntu10.45 for Xenial, 1:2.11+dfsg-1ubuntu7.31 for Bionic, and 1:4.2-3ubuntu6.4 for Focal.
To fix CVE-2020-13754 in Debian, you need to update QEMU to the specified versions: 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, or 1:8.1.2+ds-1.