QID 352251
Date Published: 2021-03-26
QID 352251: Amazon Linux Security Advisory for qemu: ALAS2-2021-1617
<DIV> Issue Overview:
An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy() routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. (CVE-2020-13765 )
An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service. (CVE-2020-16092 )
</DIV>Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
- ALAS-2021-1617 -
alas.aws.amazon.com/AL2/ALAS-2021-1617.html
CVEs related to QID 352251
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2021-1617 | Amazon Linux 2 | qemu (3.1.0-8.amzn2.0.7) on aarch64 |
|
| ALAS-2021-1617 | Amazon Linux 2 | qemu (3.1.0-8.amzn2.0.7) on i686 |
|
| ALAS-2021-1617 | Amazon Linux 2 | qemu (3.1.0-8.amzn2.0.7) on src |
|
| ALAS-2021-1617 | Amazon Linux 2 | qemu (3.1.0-8.amzn2.0.7) on x86_64 |
|