First published: Thu Jan 23 2020(Updated: )
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu-kvm-ma | <10:2.12.0-44.el7 | 10:2.12.0-44.el7 |
redhat/qemu-kvm-ma | <10:2.10.0-21.el7_5.5 | 10:2.10.0-21.el7_5.5 |
redhat/qemu-kvm-ma | <10:2.12.0-18.el7_6.5 | 10:2.12.0-18.el7_6.5 |
redhat/qemu-kvm-ma | <10:2.12.0-33.el7_7.3 | 10:2.12.0-33.el7_7.3 |
redhat/qemu-kvm-rhev | <10:2.12.0-33.el7_7.10 | 10:2.12.0-33.el7_7.10 |
redhat/qemu-kvm-rhev | <10:2.12.0-44.el7 | 10:2.12.0-44.el7 |
redhat/qemu-kvm-rhev | <10:2.12.0-18.el7_6.9 | 10:2.12.0-18.el7_6.9 |
redhat/QEMU | <4.2.1 | 4.2.1 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 | |
QEMU KVM | >=2.12.0<4.2.1 | |
redhat openstack | =10 | |
redhat openstack | =13 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw is CVE-2020-1711.
The severity of CVE-2020-1711 is high.
QEMU versions 2.12.0 before 4.2.1 and qemu-kvm-ma versions 10:2.12.0-44.el7, 10:2.10.0-21.el7_5.5, 10:2.12.0-18.el7_6.5, 10:2.12.0-33.el7_7.3, 10:2.12.0-33.el7_7, 10:2.12.0-33.el7_7.10, 10:2.12.0-44.el7, 10:2.12.0-18.el7_6.9 are affected.
The fix for CVE-2020-1711 is to update QEMU to version 4.2.1 or later.
Yes, you can find more information about CVE-2020-1711 at the following references: [Link 1](https://lists.gnu.org/archive/html/qemu-devel/2020-01/msg05535.html), [Link 2](https://www.openwall.com/lists/oss-security/2020/01/23/3), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1794494).