CVE-2020-27617

NameCVE-2020-27617
Descriptioneth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2469-1
NVD severitymedium
Debian Bugs973324

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)stretch1:2.8+dfsg-6+deb9u9vulnerable
stretch (security)1:2.8+dfsg-6+deb9u12fixed
buster, buster (security)1:3.1+dfsg-8+deb10u8vulnerable
bullseye, sid1:5.1+dfsg-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcestretch1:2.8+dfsg-6+deb9u12DLA-2469-1
qemusource(unstable)(unfixed)973324

Notes

[buster] - qemu <postponed> (Fix along in future DSA)
https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06023.html
Fixed by: https://git.qemu.org/?p=qemu.git;a=commit;h=7564bf7701f00214cdc8a678a9f7df765244def1 (v5.2.0-rc2)

Search for package or bug name: Reporting problems