[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2061 --- qemu

ID: oval:org.secpod.oval:def:1701322Date: (C)2023-06-13   (M)2024-05-22
Class: PATCHFamily: unix




A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected. A flaw was found in the USB redirector device of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page if the 'page' argument was set to MODE_PAGE_ALLS . A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor-greater than header.width` and `cursor-greater than header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process. An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
qemu-guest-agent
qemu-img
Reference:
ALAS2-2023-2061
CVE-2021-20196
CVE-2021-3392
CVE-2021-3527
CVE-2021-3930
CVE-2021-4207
CVE-2022-4144
CVE    6
CVE-2021-20196
CVE-2021-3392
CVE-2021-3527
CVE-2021-4207
...

© SecPod Technologies