![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2021.4467.2 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-4467-2) |
Summary: | The remote host is missing an update for the 'qemu' package(s) announced via the USN-4467-2 advisory. |
Description: | Summary: The remote host is missing an update for the 'qemu' package(s) announced via the USN-4467-2 advisory. Vulnerability Insight: USN-4467-1 fixed several vulnerabilities in QEMU. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: It was discovered that the QEMU SD memory card implementation incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13253) Ren Ding and Hanqing Zhao discovered that the QEMU ES1370 audio driver incorrectly handled certain invalid frame counts. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13361) Ren Ding and Hanqing Zhao discovered that the QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13362) Alexander Bulekov discovered that QEMU MegaRAID SAS SCSI driver incorrectly handled certain memory space operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13659) Ren Ding, Hanqing Zhao, Alexander Bulekov, and Anatoly Trosinenko discovered that the QEMU incorrectly handled certain msi-x mmio operations. An attacker inside a guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. (CVE-2020-13754) Ziming Zhang, Xiao Wei, Gonglei Arei and Yanyu Zhang discovered that QEMU incorrectly handled certain USB packets. An attacker could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2020-14364) Affected Software/OS: 'qemu' package(s) on Ubuntu 14.04. Solution: Please install the updated package(s). CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-13253 https://security.gentoo.org/glsa/202011-09 https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html https://usn.ubuntu.com/4467-1/ Common Vulnerability Exposure (CVE) ID: CVE-2020-13361 Debian Security Information: DSA-4728 (Google Search) https://www.debian.org/security/2020/dsa-4728 https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html https://security-tracker.debian.org/tracker/CVE-2020-13361 https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html SuSE Security Announcement: openSUSE-SU-2020:1108 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html Common Vulnerability Exposure (CVE) ID: CVE-2020-13362 https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03131.html https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg06250.html https://security-tracker.debian.org/tracker/CVE-2020-13362 Common Vulnerability Exposure (CVE) ID: CVE-2020-13659 https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg07313.html Common Vulnerability Exposure (CVE) ID: CVE-2020-13754 https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html http://www.openwall.com/lists/oss-security/2020/06/15/8 Common Vulnerability Exposure (CVE) ID: CVE-2020-14364 Debian Security Information: DSA-4760 (Google Search) https://www.debian.org/security/2020/dsa-4760 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTZQUQ6ZBPMFMNAUQBVJFELYNMUZLL6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M52WIRMZL6TZRYZ65N6OAYNNFHV62O2N/ https://security.gentoo.org/glsa/202009-14 https://bugzilla.redhat.com/show_bug.cgi?id=1869201 https://www.openwall.com/lists/oss-security/2020/08/24/2 https://www.openwall.com/lists/oss-security/2020/08/24/3 SuSE Security Announcement: openSUSE-SU-2020:1664 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html https://usn.ubuntu.com/4511-1/ |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |