First published: Tue Jul 21 2020(Updated: )
A use-after-free issue was found in the INTEL 82574 NIC (e1000e) emulator of the QEMU. It could while sending packets if the guest user set the packet data address to e1000e's MMIO address. A guest user/process could use this flaw to crash the QEMU process on the host resulting in DoS scenario. Upstream patch: ---------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg06147.html">https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg06147.html</a> Reference: ---------- -> <a href="https://bugs.launchpad.net/qemu/+bug/1886362">https://bugs.launchpad.net/qemu/+bug/1886362</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Intel 82574 NIC | ||
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1859168 is classified as a denial-of-service vulnerability due to a use-after-free issue in the QEMU INTEL 82574 NIC emulator.
To fix REDHAT-BUG-1859168, users should update to the latest version of QEMU that includes a patch for this vulnerability.
REDHAT-BUG-1859168 affects systems using the Intel 82574 NIC emulator in QEMU.
The attack vector for REDHAT-BUG-1859168 involves guest users manipulating packet data addresses to trigger the use-after-free condition.
REDHAT-BUG-1859168 is a use-after-free vulnerability that can lead to a denial of service by crashing the QEMU process.