ALAS-2021-1488 ---- qemu-kvm, qemu-imgID: oval:org.secpod.oval:def:1601422 | Date: (C)2021-03-22 (M)2023-11-10 |
Class: PATCH | Family: unix |
An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service
Platform: |
Amazon Linux AMI |