First published: Fri Jan 29 2021(Updated: )
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg07935.html">https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg07935.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1922441 is critical as it can lead to a denial-of-service (DoS) condition on the host.
REDHAT-BUG-1922441 affects QEMU by allowing a privileged guest user to crash the QEMU process due to an integer overflow in the vmxnet3 NIC emulator.
To fix REDHAT-BUG-1922441, apply the upstream patch provided by QEMU maintainers.
REDHAT-BUG-1922441 affects multiple versions of QEMU that include the vmxnet3 NIC emulator.
A privileged guest user can exploit REDHAT-BUG-1922441 by supplying invalid values for NIC parameters.