vulnerability
Amazon Linux AMI: CVE-2020-14364: Security patch for qemu-kvm (ALAS-2020-1449)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:M/C:P/I:P/A:P) | Aug 31, 2020 | Nov 18, 2020 | May 21, 2025 |
Severity
4
CVSS
(AV:L/AC:M/Au:M/C:P/I:P/A:P)
Published
Aug 31, 2020
Added
Nov 18, 2020
Modified
May 21, 2025
Description
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Solution
amazon-linux-upgrade-qemu-kvm
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.