Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-20203
HistoryFeb 25, 2021 - 12:00 a.m.

CVE-2021-20203

2021-02-2500:00:00
ubuntu.com
ubuntu.com
8

3.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

21.4%

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU
for versions up to v5.2.0. It may occur if a guest was to supply invalid
values for rx/tx queue size or other NIC parameters. A privileged guest
user may use this flaw to crash the QEMU process on the host resulting in
DoS scenario.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchqemu< 1:2.11+dfsg-1ubuntu7.39UNKNOWN
ubuntu20.04noarchqemu< 1:4.2-3ubuntu6.21UNKNOWN
ubuntu21.10noarchqemu< 1:6.0+dfsg-2expubuntu1.2UNKNOWN
ubuntu22.04noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN
ubuntu22.10noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN
ubuntu23.04noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN
ubuntu23.10noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN
ubuntu14.04noarchqemu< anyUNKNOWN
ubuntu16.04noarchqemu< anyUNKNOWN

3.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

21.4%