Description
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2288-1 | qemu security update |
Debian DSA |
DSA-4760-1 | qemu security update |
EUVD |
EUVD-2020-7844 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555. |
Ubuntu USN |
USN-4467-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:30:22.902Z
Reserved: 2020-07-21T00:00:00.000Z
Link: CVE-2020-15863
No data.
Status : Modified
Published: 2020-07-28T16:15:12.777
Modified: 2024-11-21T05:06:20.100
Link: CVE-2020-15863
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN