[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1485 --- qemu ivshmem-tools

ID: oval:org.secpod.oval:def:1700508Date: (C)2020-11-27   (M)2023-12-20
Class: PATCHFamily: unix




A use after free vulnerability in ip_reass in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. A use-after-free flaw was found in the SLiRP networking implementation of the QEMU emulator. Specifically, this flaw occurs in the ip_reass routine while reassembling incoming IP fragments whose combined size is bigger than 65k. This flaw allows an attacker to crash the QEMU process on the host, resulting in a denial of service

Platform:
Amazon Linux 2
Product:
qemu
ivshmem-tools
Reference:
ALAS2-2020-1485
CVE-2020-1983
CVE    1
CVE-2020-1983
CPE    3
cpe:/a:qemu:ivshmem-tools
cpe:/a:qemu:qemu
cpe:/o:amazon:linux:2

© SecPod Technologies