vulnerability

Amazon Linux AMI 2: CVE-2018-5748: Security patch for libvirt (ALAS-2018-1049)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2018-01-25
Added
2020-04-27
Modified
2024-11-27

Description

qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.

Solution(s)

amazon-linux-ami-2-upgrade-libvirtamazon-linux-ami-2-upgrade-libvirt-adminamazon-linux-ami-2-upgrade-libvirt-clientamazon-linux-ami-2-upgrade-libvirt-daemonamazon-linux-ami-2-upgrade-libvirt-daemon-config-networkamazon-linux-ami-2-upgrade-libvirt-daemon-config-nwfilteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-interfaceamazon-linux-ami-2-upgrade-libvirt-daemon-driver-lxcamazon-linux-ami-2-upgrade-libvirt-daemon-driver-networkamazon-linux-ami-2-upgrade-libvirt-daemon-driver-nodedevamazon-linux-ami-2-upgrade-libvirt-daemon-driver-nwfilteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-qemuamazon-linux-ami-2-upgrade-libvirt-daemon-driver-secretamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storageamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-coreamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-diskamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-glusteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-iscsiamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-logicalamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-mpathamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-rbdamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-scsiamazon-linux-ami-2-upgrade-libvirt-daemon-kvmamazon-linux-ami-2-upgrade-libvirt-daemon-lxcamazon-linux-ami-2-upgrade-libvirt-debuginfoamazon-linux-ami-2-upgrade-libvirt-develamazon-linux-ami-2-upgrade-libvirt-docsamazon-linux-ami-2-upgrade-libvirt-libsamazon-linux-ami-2-upgrade-libvirt-lock-sanlockamazon-linux-ami-2-upgrade-libvirt-login-shellamazon-linux-ami-2-upgrade-libvirt-nss
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.