CVE-2021-20203

Source
https://cve.org/CVERecord?id=CVE-2021-20203
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20203.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-20203
Downstream
Related
Published
2021-02-25T20:15:11.597Z
Modified
2026-02-15T00:44:34.830583Z
Severity
  • 3.2 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

References

Affected packages

Git / github.com/identitypython/pysaml2

Affected ranges

Type
GIT
Repo
https://github.com/identitypython/pysaml2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*
0.1
0.2
0.4
0.4.1
0.4.2
1.*
1.0.0
1.0.1
2.*
2.0.0
2.1.0
2.3.0
2.4.0
3.*
3.0.0
4.*
4.0.0
v1.*
v1.0.3
v2.*
v2.2.0
v3.*
v3.0.2
v4.*
v4.1.0
v4.2.0
v4.3.0
v4.4.0
v4.5.0
v4.6.0
v4.6.1
v4.6.2
v4.6.3
v4.6.4
v4.6.5
v4.7.0
v4.8.0
v4.9.0
v5.*
v5.0.0
v5.1.0
v5.2.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20203.json"