[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1248 --- qemu ivshmem-tools

ID: oval:org.secpod.oval:def:1700516Date: (C)2020-11-27   (M)2023-12-20
Class: PATCHFamily: unix




A heap buffer overflow issue was found in the load_device_tree function of QEMU, which is invoked to load a device tree blob at boot time. It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type. A user/process could use this flaw to potentially execute arbitrary code on a host system with privileges of the QEMU process. hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver. Slirp: information leakage in tcp_emu due to uninitialized stack variables qxl: null pointer dereference while releasing spice resources

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
Reference:
ALAS2-2019-1248
CVE-2019-12155
CVE-2019-5008
CVE-2018-20815
CVE-2019-9824
CVE    4
CVE-2019-12155
CVE-2019-5008
CVE-2018-20815
CVE-2019-9824
...
CPE    3
cpe:/a:qemu:ivshmem-tools
cpe:/a:qemu:qemu
cpe:/o:amazon:linux:2

© SecPod Technologies