Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for qemu (EulerOS-SA-2020-2320)
Summary:The remote host is missing an update for the Huawei EulerOS; 'qemu' package(s) announced via the EulerOS-SA-2020-2320 advisory.
The remote host is missing an update for the Huawei EulerOS
'qemu' package(s) announced via the EulerOS-SA-2020-2320 advisory.

Vulnerability Insight:
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.(CVE-2020-10761)

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.(CVE-2020-13659)

In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.(CVE-2020-13361)

In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.(CVE-2020-13362)

sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.(CVE-2020-13253)

Affected Software/OS:
'qemu' package(s) on Huawei EulerOS V2.0SP8.

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-10761
Common Vulnerability Exposure (CVE) ID: CVE-2020-13253
Common Vulnerability Exposure (CVE) ID: CVE-2020-13361
Common Vulnerability Exposure (CVE) ID: CVE-2020-13362
Common Vulnerability Exposure (CVE) ID: CVE-2020-13659
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2020 E-Soft Inc. All rights reserved.