Out-of-bounds Write Affecting qemu package, versions <1:5.0-12


0.0
medium

Snyk CVSS

    Attack Complexity High
    Scope Changed

    Threat Intelligence

    EPSS 0.05% (20th percentile)
Expand this section
NVD
5.3 medium
Expand this section
SUSE
8.2 high
Expand this section
Red Hat
5.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIANUNSTABLE-QEMU-589965
  • published 22 Jul 2020
  • disclosed 28 Jul 2020

How to fix?

Upgrade Debian:unstable qemu to version 1:5.0-12 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qemu package and not the qemu package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.