Описание
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Out of support scope | ||
Red Hat Enterprise Linux 5 | xen | Out of support scope | ||
Red Hat Enterprise Linux 6 | qemu-kvm | Out of support scope | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.2/qemu-kvm | Affected | ||
Red Hat Enterprise Linux 8 Advanced Virtualization | virt:8.3/qemu-kvm | Affected | ||
Red Hat Enterprise Linux 9 | qemu-kvm | Not affected | ||
Red Hat OpenStack Platform 10 (Newton) | qemu-kvm-rhev | Out of support scope | ||
Advanced Virtualization for RHEL 8.2.1 | virt | Fixed | RHSA-2020:5111 | 18.11.2020 |
Advanced Virtualization for RHEL 8.2.1 | virt-devel | Fixed | RHSA-2020:5111 | 18.11.2020 |
Red Hat Enterprise Linux 7 | qemu-kvm-ma | Fixed | RHSA-2021:0346 | 02.02.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.8 Low
CVSS3
Связанные уязвимости
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
In QEMU through 5.0.0, an assertion failure can occur in the network p ...
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
EPSS
3.8 Low
CVSS3