[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1562 --- qemu ivshmem-tools

ID: oval:org.secpod.oval:def:1700514Date: (C)2020-11-27   (M)2023-12-20
Class: PATCHFamily: unix




A memory leakage flaw was found in the way the VNC display driver of QEMU handled the connection disconnect when ZRLE and Tight encoding are enabled. Two VncState objects are created, and one allocates memory for the Zlib"s data object. This allocated memory is not freed upon disconnection, resulting in a memory leak. An attacker able to connect to the VNC server could use this flaw to leak host memory, leading to a potential denial of service. An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU. This issue occurs while processing USB packets from a guest when USBDevice "setup_len" exceeds its "data_buf[4096]" in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
Reference:
ALAS2-2020-1562
CVE-2019-20382
CVE-2020-14364
CVE    2
CVE-2019-20382
CVE-2020-14364
CPE    3
cpe:/a:qemu:ivshmem-tools
cpe:/a:qemu:qemu
cpe:/o:amazon:linux:2

© SecPod Technologies