CVE-2020-15863

Name
CVE-2020-15863
Description
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555
Mailing List http://www.openwall.com/lists/oss-security/2020/07/22/1
Mailing List https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg03497.html
Mailing List https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg05745.html
Third Party Advisory https://usn.ubuntu.com/4467-1/
Third Party Advisory https://www.debian.org/security/2020/dsa-4760
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* qemu >= None <= 5.0.0
cpe:2.3:a:qemu:qemu:5.1.0:rc0:*:*:*:*:*:* qemu == None == 5.1.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
qemu 3.10-main 4.0.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable