ID CVE-2020-27617
Summary eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
References
Vulnerable Configurations
  • cpe:2.3:a:qemu:qemu:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 23-09-2022 - 15:28)
Impact:
Exploitability:
CWE CWE-617
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:N/A:P
refmap via4
confirm
misc https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05731.html
mlist [debian-lts-announce] 20201129 [SECURITY] [DLA 2469-1] qemu security update
Last major update 23-09-2022 - 15:28
Published 06-11-2020 - 08:15
Last modified 23-09-2022 - 15:28
Back to Top