Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.843830
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3826-1)
Summary:The remote host is missing an update for the 'qemu' package(s) announced via the USN-3826-1 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu' package(s) announced via the USN-3826-1 advisory.

Vulnerability Insight:
Daniel Shapira and Arash Tohidi discovered that QEMU incorrectly handled
NE2000 device emulation. An attacker inside the guest could use this issue
to cause QEMU to crash, resulting in a denial of service. (CVE-2018-10839)

It was discovered that QEMU incorrectly handled the Slirp networking
back-end. A privileged attacker inside the guest could use this issue to
cause QEMU to crash, resulting in a denial of service, or possibly execute
arbitrary code on the host. In the default installation, when QEMU is used
with libvirt, attackers would be isolated by the libvirt AppArmor profile.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu
18.04 LTS. (CVE-2018-11806)

Fakhri Zulkifli discovered that the QEMU guest agent incorrectly handled
certain QMP commands. An attacker could possibly use this issue to crash
the QEMU guest agent, resulting in a denial of service. (CVE-2018-12617)

Li Qiang discovered that QEMU incorrectly handled NVM Express Controller
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code on the host. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-16847)

Daniel Shapira and Arash Tohidi discovered that QEMU incorrectly handled
RTL8139 device emulation. An attacker inside the guest could use this issue
to cause QEMU to crash, resulting in a denial of service. (CVE-2018-17958)

Daniel Shapira and Arash Tohidi discovered that QEMU incorrectly handled
PCNET device emulation. An attacker inside the guest could use this issue
to cause QEMU to crash, resulting in a denial of service. (CVE-2018-17962)

Daniel Shapira discovered that QEMU incorrectly handled large packet sizes.
An attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. (CVE-2018-17963)

It was discovered that QEMU incorrectly handled LSI53C895A device
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. (CVE-2018-18849)

Moguofang discovered that QEMU incorrectly handled the IPowerNV LPC
controller. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. This issue only affected Ubuntu
18.04 LTS and Ubuntu 18.10. (CVE-2018-18954)

Zhibin Hu discovered that QEMU incorrectly handled the Plan 9 File System
support. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. (CVE-2018-19364)

Affected Software/OS:
'qemu' package(s) on Ubuntu 14.04, Ubuntu 16.04, Ubuntu 18.04, Ubuntu 18.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-10839
DSA-4338
https://www.debian.org/security/2018/dsa-4338
RHSA-2019:2892
https://access.redhat.com/errata/RHSA-2019:2892
USN-3826-1
https://usn.ubuntu.com/3826-1/
[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
[oss-security] 20181008 Qemu: integer overflow issues
https://www.openwall.com/lists/oss-security/2018/10/08/1
[qemu-devel] 20180926 [PULL 21/25] ne2000: fix possible out of bound access in ne2000_receive
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10839
Common Vulnerability Exposure (CVE) ID: CVE-2018-11806
BugTraq ID: 104400
http://www.securityfocus.com/bid/104400
Bugtraq: 20190531 [SECURITY] [DSA 4454-1] qemu security update (Google Search)
https://seclists.org/bugtraq/2019/May/76
Debian Security Information: DSA-4454 (Google Search)
https://www.debian.org/security/2019/dsa-4454
https://www.zerodayinitiative.com/advisories/ZDI-18-567/
https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html
http://www.openwall.com/lists/oss-security/2018/06/07/1
https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html
RedHat Security Advisories: RHSA-2018:2462
https://access.redhat.com/errata/RHSA-2018:2462
RedHat Security Advisories: RHSA-2018:2762
https://access.redhat.com/errata/RHSA-2018:2762
RedHat Security Advisories: RHSA-2018:2822
https://access.redhat.com/errata/RHSA-2018:2822
RedHat Security Advisories: RHSA-2018:2887
https://access.redhat.com/errata/RHSA-2018:2887
RedHat Security Advisories: RHSA-2019:2892
Common Vulnerability Exposure (CVE) ID: CVE-2018-12617
BugTraq ID: 104531
http://www.securityfocus.com/bid/104531
https://www.exploit-db.com/exploits/44925/
https://gist.github.com/fakhrizulkifli/c7740d28efa07dafee66d4da5d857ef6
https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg03385.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00041.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-16847
105866
http://www.securityfocus.com/bid/105866
[oss-security] 20181102 CVE-2018-16847 QEMU: nvme: Out-of-bounds r/w buffer access in cmb operations
https://www.openwall.com/lists/oss-security/2018/11/02/1
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16847
https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00200.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-17958
BugTraq ID: 105556
http://www.securityfocus.com/bid/105556
https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html
http://www.openwall.com/lists/oss-security/2018/10/08/1
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03269.html
RedHat Security Advisories: RHSA-2019:2425
https://access.redhat.com/errata/RHSA-2019:2425
RedHat Security Advisories: RHSA-2019:2553
https://access.redhat.com/errata/RHSA-2019:2553
Common Vulnerability Exposure (CVE) ID: CVE-2018-17962
Debian Security Information: DSA-4338 (Google Search)
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03268.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-17963
https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg06054.html
https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03267.html
RedHat Security Advisories: RHSA-2019:2166
https://access.redhat.com/errata/RHSA-2019:2166
Common Vulnerability Exposure (CVE) ID: CVE-2018-18849
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQIBTGNRDQEXGAAYHE4JIWFAYFNHZ6QP/
http://www.openwall.com/lists/oss-security/2018/11/01/1
https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg06401.html
SuSE Security Announcement: openSUSE-SU-2018:4004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html
SuSE Security Announcement: openSUSE-SU-2018:4111 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html
SuSE Security Announcement: openSUSE-SU-2018:4147 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-18954
BugTraq ID: 105920
http://www.securityfocus.com/bid/105920
https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00446.html
http://www.openwall.com/lists/oss-security/2018/11/06/6
SuSE Security Announcement: openSUSE-SU-2019:1074 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-19364
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
http://www.openwall.com/lists/oss-security/2018/11/20/1
https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html
https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.