Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-4056

Опубликовано: 30 сент. 2020
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2020-4056: qemu-kvm security update (IMPORTANT)

[0.12.1.2-2.506.el6_10.8]

  • kvm-qemu-kvm-QEMU-usb-check-RNDIS-message-length.patch [bz#1869684]
  • kvm-qemu-kvm-QEMU-usb-fix-setup_len-init-CVE-2020-14364.patch [bz#1869684]
  • Resolves: bz#1869684 (CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-6.10.z])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.506.el6_10.8

qemu-img

0.12.1.2-2.506.el6_10.8

qemu-kvm

0.12.1.2-2.506.el6_10.8

qemu-kvm-tools

0.12.1.2-2.506.el6_10.8

Oracle Linux i686

qemu-guest-agent

0.12.1.2-2.506.el6_10.8

Связанные CVE

Связанные уязвимости

CVSS3: 5
ubuntu
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVSS3: 5
redhat
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVSS3: 5
nvd
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVSS3: 5
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5
debian
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator ...