CVE-2020-16092

CVE Details

Release Date:2020-08-11
Impact:None What is this?

Description


In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.

See more information about CVE-2020-16092 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 3.8
Vector String: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
Version: 3.0
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Changed
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Low

Errata information


PlatformErrataRelease Date


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete