|Title:||QEMU <= 5.0.0 Multiple Vulnerabilities|
|Summary:||QEMU is prone to multiple vulnerabilities.|
QEMU is prone to multiple vulnerabilities.
The following vulnerabilities exist:
- es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count,
which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation. (CVE-2020-13361)
- megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read
via a crafted reply_queue_head field from a guest OS user. (CVE-2020-13362)
- There is a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c
due to an assertion failure that can occur during network packet processing. (CVE-2020-16092)
QEMU through version 5.0.0.
Update to version 5.1.0.
Common Vulnerability Exposure (CVE) ID: CVE-2020-13361|
Common Vulnerability Exposure (CVE) ID: CVE-2020-13362
Common Vulnerability Exposure (CVE) ID: CVE-2020-16092
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.