CVE-2020-13253

MEDIUM

QEMU 4.2.0 - Memory Corruption

Title source: llm
STIX 2.1

Description

sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.

References (7)

Core 7
Core References
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
Mailing List, Patch, Third Party Advisory x_refsource_confirm
http://www.openwall.com/lists/oss-security/2020/05/27/2
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1838546
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4467-1/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202011-09
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html

Scores

CVSS v3 5.5
EPSS 0.0012
EPSS Percentile 29.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (6)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
debian/debian_linux 9.0
debian/debian_linux 10.0
qemu/qemu < 5.0.1
Published May 27, 2020
Tracked Since Feb 18, 2026