[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2148 --- qemu

ID: oval:org.secpod.oval:def:1701426Date: (C)2023-08-08   (M)2024-04-25
Class: PATCHFamily: unix




A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. There is a vulnerability in the lsi53c895a device which affects the latest version of qemu. The carefully designed PoC can repeatedly trigger DMA writes but does not limit the addresses written to the DMA, resulting in reentrancy issues and eventually overflow. 9pfs: prevent opening special files: A malicious client could potentially escape from the exported 9p tree by creating and opening a device file on host side

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
qemu-guest-agent
qemu-img
Reference:
ALAS2-2023-2148
CVE-2021-3416
CVE-2023-0330
CVE-2023-2861
CVE    3
CVE-2021-3416
CVE-2023-0330
CVE-2023-2861

© SecPod Technologies