CVE-2020-16092

Priority
Description
In QEMU through 5.0.0, an assertion failure can occur in the network packet
processing. This issue affects the e1000e and vmxnet3 network devices. A
malicious guest user/process could use this flaw to abort the QEMU process
on the host, resulting in a denial of service condition in
net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
Assigned-to
mdeslaur
Notes
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:2.11+dfsg-1ubuntu7.31)
Ubuntu 20.04 LTS (Focal Fossa):released (1:4.2-3ubuntu6.4)
Ubuntu 20.10 (Groovy Gorilla):released (1:5.0-5ubuntu5)
Patches:
Upstream:https://git.qemu.org/?p=qemu.git;a=commit;h=035e69b063835a5fd23cacabd63690a3d84532a8
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-09-10 06:36:32 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)