CVE-2020-13362

LOW

QEMU <5.0.0 - Memory Corruption

Title source: llm
STIX 2.1

Description

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

References (11)

Core 11
Core References
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html
Mailing List, Third Party Advisory x_refsource_confirm
http://www.openwall.com/lists/oss-security/2020/05/28/2
Third Party Advisory x_refsource_misc
https://security-tracker.debian.org/tracker/CVE-2020-13362
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200608-0003/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4728
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4467-1/
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202011-09

Scores

CVSS v3 3.2
EPSS 0.0010
EPSS Percentile 26.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

Details

CWE
CWE-125
Status published
Products (8)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
debian/debian_linux 8.0
debian/debian_linux 9.0
debian/debian_linux 10.0
opensuse/leap 15.2
qemu/qemu < 5.0.0
Published May 28, 2020
Tracked Since Feb 18, 2026