[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2021-1488 ---- qemu-kvm, qemu-img

ID: oval:org.secpod.oval:def:1601422Date: (C)2021-03-22   (M)2023-11-10
Class: PATCHFamily: unix




An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service

Platform:
Amazon Linux AMI
Product:
qemu-kvm
qemu-img
Reference:
ALAS-2021-1488
CVE-2020-13765
CVE-2020-16092
CVE    2
CVE-2020-13765
CVE-2020-16092

© SecPod Technologies