QID 352251

Date Published: 2021-03-26

QID 352251: Amazon Linux Security Advisory for qemu: ALAS2-2021-1617

<DIV> Issue Overview:

An out-of-bound write access flaw was found in the way QEMU loads ROM contents at boot time. This flaw occurs in the rom_copy() routine while loading the contents of a 32-bit -kernel image into memory. Running an untrusted -kernel image may load contents at arbitrary memory locations, potentially leading to code execution with the privileges of the QEMU process. (CVE-2020-13765 )

An assertion failure flaw was found in QEMU in the network packet processing component. This issue affects the "e1000e" and "vmxnet3" network devices. This flaw allows a malicious guest user or process to abort the QEMU process on the host, resulting in a denial of service. (CVE-2020-16092 )

</DIV>

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as Medium - 5.6 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory ALAS-2021-1617 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 352251

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2021-1617 Amazon Linux 2 qemu (3.1.0-8.amzn2.0.7) on aarch64 URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1617.html
    ALAS-2021-1617 Amazon Linux 2 qemu (3.1.0-8.amzn2.0.7) on i686 URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1617.html
    ALAS-2021-1617 Amazon Linux 2 qemu (3.1.0-8.amzn2.0.7) on src URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1617.html
    ALAS-2021-1617 Amazon Linux 2 qemu (3.1.0-8.amzn2.0.7) on x86_64 URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1617.html