Lucene search

K
f5F5F5:K41142448
HistoryDec 02, 2020 - 12:00 a.m.

K41142448 : QEMU vulnerability CVE-2020-27617

2020-12-0200:00:00
my.f5.com
18

6.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.4%

Security Advisory Description

eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. (CVE-2020-27617)

Impact

BIG-IP

This flaw allows a guest user to cause the QEMU process on the host to stop responding, resulting in a denial of service (DoS).

This affects all BIG-IP platforms with Virtual Clustered Multiprocessing (vCMP) enabled. For more information on vCMP platforms, refer to K14088: vCMP host and compatible guest version matrix