|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for qemu (EulerOS-SA-2020-2320)|
|Summary:||The remote host is missing an update for the Huawei EulerOS; 'qemu' package(s) announced via the EulerOS-SA-2020-2320 advisory.|
The remote host is missing an update for the Huawei EulerOS
'qemu' package(s) announced via the EulerOS-SA-2020-2320 advisory.
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.(CVE-2020-10761)
address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.(CVE-2020-13659)
In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.(CVE-2020-13361)
In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.(CVE-2020-13362)
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.(CVE-2020-13253)
'qemu' package(s) on Huawei EulerOS V2.0SP8.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-10761|
Common Vulnerability Exposure (CVE) ID: CVE-2020-13253
Common Vulnerability Exposure (CVE) ID: CVE-2020-13361
Common Vulnerability Exposure (CVE) ID: CVE-2020-13362
Common Vulnerability Exposure (CVE) ID: CVE-2020-13659
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.