[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2018-1049 --- libvirt

ID: oval:org.secpod.oval:def:1700060Date: (C)2018-07-27   (M)2024-04-17
Class: PATCHFamily: unix




An incomplete fix for CVE-2018-5748 that affects QEMU monitor leading to a resource exhaustion but now also triggered via QEMU guest agent.qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service via a large QEMU reply.An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load Store instructions . It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor#039;s data cache even for speculatively executed instructions that never actually commit . As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.

Platform:
Amazon Linux 2
Product:
libvirt
Reference:
ALAS2-2018-1049
CVE-2018-5748
CVE-2018-1064
CVE-2018-3639
CVE    3
CVE-2018-1064
CVE-2018-5748
CVE-2018-3639
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:redhat:libvirt

© SecPod Technologies