First published: Thu Nov 12 2020(Updated: )
An infinite loop flaw was found in the e1000e device emulator in QEMU. This issue could occur while receiving packets via the e1000e_write_packet_to_guest() routine, if the receive(RX) descriptor has a NULL buffer address. This flaw allows a privileged guest user to cause a denial of service. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | =5.0.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
redhat/QEMU | <5.2.0 | 5.2.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in QEMU is CVE-2020-28916.
The severity of CVE-2020-28916 is medium (CVSS score of 5.5).
The vulnerability in QEMU occurs due to an infinite loop in the e1000e device emulator while receiving packets with a NULL buffer address in the RX descriptor.
The impact of CVE-2020-28916 is a denial of service, allowing a privileged guest user to cause the system to enter an infinite loop.
To fix the CVE-2020-28916 vulnerability in QEMU, update to version 5.2.0 or later.