CVE-2020-15863
Published: 28 July 2020
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
bionic |
Released
(1:2.11+dfsg-1ubuntu7.31)
|
focal |
Released
(1:4.2-3ubuntu6.4)
|
|
groovy |
Not vulnerable
(1:4.2-3ubuntu10)
|
|
hirsute |
Not vulnerable
(1:4.2-3ubuntu10)
|
|
impish |
Not vulnerable
(1:4.2-3ubuntu10)
|
|
jammy |
Not vulnerable
(1:4.2-3ubuntu10)
|
|
kinetic |
Not vulnerable
(1:4.2-3ubuntu10)
|
|
precise |
Does not exist
|
|
trusty |
Needs triage
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1:2.5+dfsg-5ubuntu10.45)
|
|
Patches: upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555 |
||
qemu-kvm Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Ignored
(end of ESM support, was needs-triage)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|