[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2020-1400 ---- qemu-kvm, qemu-img

ID: oval:org.secpod.oval:def:1601165Date: (C)2020-07-21   (M)2023-11-10
Class: PATCHFamily: unix




In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code. tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code. tcp_emu in slirp/tcp_subr.c in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure

Platform:
Amazon Linux AMI
Product:
qemu-kvm
qemu-img
Reference:
ALAS-2020-1400
CVE-2020-8608
CVE-2020-7039
CVE-2019-9824
CVE    3
CVE-2020-7039
CVE-2020-8608
CVE-2019-9824

© SecPod Technologies