[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1617 --- qemu, ivshmem-tools

ID: oval:org.secpod.oval:def:1700568Date: (C)2021-03-22   (M)2023-11-10
Class: PATCHFamily: unix




An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
Reference:
ALAS2-2021-1617
CVE-2020-13765
CVE-2020-16092
CVE    2
CVE-2020-13765
CVE-2020-16092

© SecPod Technologies