CVE-2020-16092
11.08.2020, 16:15
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 ≤ 5.0.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 20.04 |
opensuse | leap | 15.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References