First published: Tue Jun 16 2020(Updated: )
An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=4.2.1 | |
QEMU KVM | =5.0.0-rc0 | |
QEMU KVM | =5.0.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-24352 is classified as high due to potential exploitation by a malicious guest.
To mitigate CVE-2020-24352, users should upgrade to QEMU version 5.1.0 or later where the issue has been addressed.
CVE-2020-24352 affects versions of QEMU up to and including 4.2.1, as well as specific release candidates of version 5.0.0.
An attacker exploiting CVE-2020-24352 could potentially execute arbitrary code on the host system due to out-of-bounds memory access.
While the best solution is to update, users can limit the exposure of malicious guests by isolating virtual machine environments.