QID 355614

Date Published: 2023-07-24

QID 355614: Amazon Linux Security Advisory for qemu : ALAS2-2023-2148

A potential stack overflow via infinite loop issue was found in various nic emulators of qemu in versions up to and including 5.2.0.
The issue occurs in loopback mode of a nic wherein reentrant dma checks get bypassed.
A guest user/process may use this flaw to consume cpu cycles or crash the qemu process on the host resulting in dos scenario. (
( CVE-2021-3416) there is a vulnerability in the lsi53c895a device which affects the latest version of qemu.
The carefully designed poc can repeatedly trigger dma writes but does not limit the addresses written to the dma, resulting in reentrancy issues and eventually overflow. (
( CVE-2023-0330) 9pfs: prevent opening special files: a malicious client could potentially escape from the exported 9p tree by creating and opening a device file on host side. (
( CVE-2023-2861)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 6 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2148 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355614

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2148 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2148.html