Description
QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2560-1 | qemu security update |
Debian DLA |
DLA-3099-1 | qemu security update |
EUVD |
EUVD-2020-7840 | QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. |
Ubuntu USN |
USN-4725-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:30:22.942Z
Reserved: 2020-07-20T00:00:00.000Z
Link: CVE-2020-15859
No data.
Status : Modified
Published: 2020-07-21T16:15:11.957
Modified: 2024-11-21T05:06:19.463
Link: CVE-2020-15859
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN