Description
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2623-1 | qemu security update |
Debian DLA |
DLA-3099-1 | qemu security update |
EUVD |
EUVD-2021-7647 | An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. |
Ubuntu USN |
USN-5307-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:30:07.577Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20203
No data.
Status : Modified
Published: 2021-02-25T20:15:11.597
Modified: 2024-11-21T05:46:07.413
Link: CVE-2021-20203
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN