Description
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2373-1 | qemu security update |
Debian DSA |
DSA-4760-1 | qemu security update |
Ubuntu USN |
USN-4511-1 | QEMU vulnerability |
Ubuntu USN |
USN-4467-2 | QEMU vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Qemu
Subscribe
Qemu
Subscribe
Redhat
Subscribe
Advanced Virtualization
Subscribe
Enterprise Linux
Subscribe
Openstack
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Rhev Hypervisor
Subscribe
Rhev Manager
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T12:46:34.192Z
Reserved: 2020-06-17T00:00:00.000Z
Link: CVE-2020-14364
No data.
Status : Modified
Published: 2020-08-31T18:15:12.827
Modified: 2024-11-21T05:03:05.880
Link: CVE-2020-14364
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN