First published: Tue May 12 2020(Updated: )
An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy() routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm | <10:1.5.3-175.el7_9.3 | 10:1.5.3-175.el7_9.3 |
QEMU qemu | =4.0.0 | |
QEMU qemu | =4.1.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/QEMU | <4.2.0 | 4.2.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13765 is a vulnerability that allows an out-of-bound write access in QEMU while loading ROM contents at boot time.
CVE-2020-13765 has a severity rating of 5.6, which is considered medium.
QEMU versions 4.0 and 4.1.0 are affected by CVE-2020-13765.
To fix CVE-2020-13765, update QEMU to version 4.2.0.
You can find more information about CVE-2020-13765 in the references provided: [link1], [link2], [link3].