QID 352242

Date Published: 2021-03-26

QID 352242: Amazon Linux Security Advisory for qemu-kvm: ALAS-2021-1488

<DIV> Issue Overview:

An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy() routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. (CVE-2020-13765 )

An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service. (CVE-2020-16092 )

</DIV>

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as Medium - 5.6 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory ALAS-2021-1488 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 352242

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2021-1488 Amazon Linux qemu-kvm (1.5.3-156.26.amzn1) on src URL Logo alas.aws.amazon.com/ALAS-2021-1488.html
    ALAS-2021-1488 Amazon Linux qemu-kvm (1.5.3-156.26.amzn1) on x86_64 URL Logo alas.aws.amazon.com/ALAS-2021-1488.html