#VU31802 Out-of-bounds read in QEMU - CVE-2020-13362
Published: July 24, 2020
QEMU
QEMU
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in megasas_lookup_frame in hw/scsi/megasas.c. A local user on the guest operating system can pass specially crafted message with reply_queue_head field, trigger out-of-bounds read error and read contents of memory on the system.
Remediation
External links
- http://www.openwall.com/lists/oss-security/2020/05/28/2
- https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html
- https://security.netapp.com/advisory/ntap-20200608-0003/
- https://security-tracker.debian.org/tracker/CVE-2020-13362
- https://www.debian.org/security/2020/dsa-4728