Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2022.5772.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5772-1)
Summary:The remote host is missing an update for the 'qemu' package(s) announced via the USN-5772-1 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu' package(s) announced via the USN-5772-1 advisory.

Vulnerability Insight:
It was discovered that QEMU incorrectly handled bulk transfers from SPICE
clients. A remote attacker could use this issue to cause QEMU to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3682)

It was discovered that QEMU did not properly manage memory when it
transfers the USB packets. A malicious guest attacker could use this issue
to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-3750)

It was discovered that the QEMU SCSI device emulation incorrectly handled
certain MODE SELECT commands. An attacker inside the guest could possibly
use this issue to cause QEMU to crash, resulting in a denial of service.
This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2021-3930)

It was discovered that QEMU did not properly manage memory when it
processing repeated messages to cancel the current SCSI request. A
malicious privileged guest attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. (CVE-2022-0216)

It was discovered that QEMU did not properly manage memory when it
using Tulip device emulation. A malicious guest attacker could use this
issue to cause QEMU to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.10. (CVE-2022-2962)

It was discovered that QEMU did not properly manage memory when processing
ClientCutText messages. A attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3165)

Affected Software/OS:
'qemu' package(s) on Ubuntu 14.04, Ubuntu 16.04, Ubuntu 18.04, Ubuntu 20.04, Ubuntu 22.04, Ubuntu 22.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.0

CVSS Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-3682
Debian Security Information: DSA-4980 (Google Search)
https://www.debian.org/security/2021/dsa-4980
https://security.gentoo.org/glsa/202208-27
https://bugzilla.redhat.com/show_bug.cgi?id=1989651
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3750
GLSA-202208-27
https://bugzilla.redhat.com/show_bug.cgi?id=1999073
https://gitlab.com/qemu-project/qemu/-/issues/541
https://gitlab.com/qemu-project/qemu/-/issues/556
https://security.netapp.com/advisory/ntap-20220624-0003/
Common Vulnerability Exposure (CVE) ID: CVE-2021-3930
https://bugzilla.redhat.com/show_bug.cgi?id=2020588
https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-0216
FEDORA-2022-4387579e67
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/
https://access.redhat.com/security/cve/CVE-2022-0216
https://bugzilla.redhat.com/show_bug.cgi?id=2036953
https://gitlab.com/qemu-project/qemu/-/commit/4367a20cc4
https://gitlab.com/qemu-project/qemu/-/issues/972
https://starlabs.sg/advisories/22/22-0216/
Common Vulnerability Exposure (CVE) ID: CVE-2022-2962
https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182
https://gitlab.com/qemu-project/qemu/-/issues/1171
Common Vulnerability Exposure (CVE) ID: CVE-2022-3165
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTY7TVHX62OJWF6IOBCIGLR2N5K4QN3E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I36LKZA7Z65J3LJU2P37LVTWDFTXBMPU/
https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.