3.8 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
QEMU is vulnerable to denial of service attacks. An unauthenticated remote attacker could kill the QEMU process on the host due to an assertion failure in the network packet processing, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment
in hw/net/net_tx_pkt.c
.
lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html
www.openwall.com/lists/oss-security/2020/08/10/1
lists.debian.org/debian-lts-announce/2020/09/msg00013.html
lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html
security-tracker.debian.org/tracker/CVE-2020-16092
security.netapp.com/advisory/ntap-20200821-0006/
usn.ubuntu.com/4467-1/
www.debian.org/security/2020/dsa-4760
3.8 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P