169
VMScore

CVE-2020-13659

Published: 02/06/2020 Updated: 16/11/2022
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 2.5 | Impact Score: 1.4 | Exploitability Score: 0.8
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 4.2.0

debian debian linux 9.0

debian debian linux 10.0

opensuse leap 15.2

canonical ubuntu linux 18.04

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

Vendor Advisories

Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service For the stable distribution (buster), these problems have been fixed in version 1:31+dfsg-8+deb10u6 We recommend that you upgrade your qemu packages For the detailed security status of qemu please refer to its security tracker pa ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-13659 QEMU: exec: address_space_map returns NULL without setting length to zero may lead to DoS <!--X-Subject-Header- ...