|Category:||Debian Local Security Checks|
|Title:||Debian: Security Advisory for qemu (DSA-4760-1)|
|Summary:||The remote host is missing an update for the 'qemu'; package(s) announced via the DSA-4760-1 advisory.|
The remote host is missing an update for the 'qemu'
package(s) announced via the DSA-4760-1 advisory.
Multiple security issues were discovered in QEMU, a fast processor
An integer overflow in the sm501 display device may result in denial of
An out-of-bounds write in the USB emulation code may result in
guest-to-host code execution.
A buffer overflow in the XGMAC network device may result in denial of
service or the execution of arbitrary code.
A triggerable assert in the e1000e and vmxnet3 devices may result in
denial of service.
'qemu' package(s) on Debian Linux.
For the stable distribution (buster), these problems have been fixed in
We recommend that you upgrade your qemu packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-12829|
Common Vulnerability Exposure (CVE) ID: CVE-2020-14364
Common Vulnerability Exposure (CVE) ID: CVE-2020-15863
Common Vulnerability Exposure (CVE) ID: CVE-2020-16092
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.