CVE-2020-15859
Published: 21 July 2020
QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
Priority
CVSS 3 base score: 3.3
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
Upstream |
Released
(1:5.2+dfsg-1)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1:5.2+dfsg-3ubuntu1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1:5.0-5ubuntu9.4)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1:4.2-3ubuntu6.12)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1:2.11+dfsg-1ubuntu7.35)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:2.5+dfsg-5ubuntu10.49)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needs triage
|
|
Patches: Upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=22dc8663d9fc7baa22100544c600b6285a63c7a3 |
||
qemu-kvm Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859
- https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05895.html
- https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05304.html
- https://www.openwall.com/lists/oss-security/2020/07/21/3
- https://usn.ubuntu.com/usn/usn-4725-1
- NVD
- Launchpad
- Debian