Page 16 of 77 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU. Se encontró un fallo en QEMU en la implementación del soporte Pointer Authentication (PAuth) para ARM introducido en la versión 4.0 y corregido en la versión 5.0.0. Un fallo general del proceso de generación de firmas causó que cada puntero aplicado por PAuth se firmara con la misma firma. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10702 https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=de0b1bae6461f67243282555475f88b2384a1eb9 https://security.netapp.com/advisory/ntap-20200724-0007 • CWE-325: Missing Cryptographic Step •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host. Se encontró un fallo potencial de DoS en la implementación del demonio del sistema de archivos compartido virtio-fs (virtiofsd) de QEMU versiones anteriores a la versión v5.0. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10717 https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg00141.html https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg00143.html https://security.gentoo.org/glsa/202011-09 https://www.openwall.com/lists/oss-security/2020/05/04/1 • CWE-770: Allocation of Resources Without Limits or Throttling •