CVE-2020-13765

rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:4.1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319 - () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319 -
References () https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676 - Patch, Third Party Advisory () https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200619-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200619-0006/ - Third Party Advisory
References () https://usn.ubuntu.com/4467-1/ - Third Party Advisory () https://usn.ubuntu.com/4467-1/ - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2020/06/03/6 - Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2020/06/03/6 - Mailing List, Third Party Advisory

07 Nov 2023, 03:16

Type Values Removed Values Added
References
  • {'url': 'https://git.qemu.org/?p=qemu.git;a=commit;h=e423455c4f23a1a828901c78fe6d03b7dde79319', 'name': 'https://git.qemu.org/?p=qemu.git;a=commit;h=e423455c4f23a1a828901c78fe6d03b7dde79319', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319 -

Information

Published : 2020-06-04 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13765

Mitre link : CVE-2020-13765

CVE.ORG link : CVE-2020-13765


JSON object : View

Products Affected

debian

  • debian_linux

qemu

  • qemu

canonical

  • ubuntu_linux
CWE
CWE-787

Out-of-bounds Write