First published: Thu Jun 04 2020(Updated: )
hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:3.1+dfsg-8+deb10u8 1:3.1+dfsg-8+deb10u11 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u3 1:8.1.2+ds-1 1:8.2.0+ds-1 | |
QEMU KVM | <=5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13791 has been classified with high severity due to potential out-of-bounds access vulnerabilities.
To fix CVE-2020-13791, upgrade to the latest patched version of QEMU available for your distribution.
CVE-2020-13791 affects QEMU versions prior to 5.0.1, including 4.2.0.
CVE-2020-13791 can be exploited by guest OS users to trigger an out-of-bounds access, potentially leading to denial of service or code execution.
Yes, CVE-2020-13791 is present in several versions of the Debian qemu package prior to the fixed releases.