5.5
CVSSv3

CVE-2020-28916

Published: 04/12/2020 Updated: 30/09/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 5.0.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #976388 qemu: CVE-2020-28916 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 4 Dec 2020 13:06:01 UTC Severity: important Tags: security, upstream Found in version qemu/1 ...
An infinite loop issue was found in the e1000e device emulator in QEMU The issue could occur while receiving packets via e1000e_write_packet_to_guest() routine, if the receive(RX) descriptor has NULL buffer address A privileged guest user may use this flaw to induce a DoS scenario on the host ...

Mailing Lists

Hello, Upstream patch: --------------- -> listsnongnuorg/archive/html/qemu-devel/2020-11/msg03185html This issue was reported by Cheol-woo Myung CVE-2020-28916 assigned via -> cveformmitreorg/ Thank you -- Prasad J Pandit / Red Hat Product Security Team 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D ...