7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
Low
0.011 Low
EPSS
Percentile
84.3%
Package : qemu
Version : 1:2.1+dfsg-12+deb8u11
CVE ID : CVE-2018-11806 CVE-2018-18849 CVE-2018-20815 CVE-2019-9824
Debian Bug : 901017 912535
Several vulnerabilities were found in QEMU, a fast processor emulator:
CVE-2018-11806
It was found that the SLiRP networking implementation could use a wrong
size when reallocating its buffers, which can be exploited by a
priviledged user on a guest to cause denial of service or possibly
arbitrary code execution on the host system.
CVE-2018-18849
It was found that the LSI53C895A SCSI Host Bus Adapter emulation was
susceptible to an out of bounds memory access, which could be leveraged
by a malicious guest user to crash the QEMU process.
CVE-2018-20815
A heap buffer overflow was found in the load_device_tree function,
which could be used by a malicious user to potentially execute
arbitrary code with the priviledges of the QEMU process.
CVE-2019-9824
William Bowling discovered that the SLiRP networking implementation did
not handle some messages properly, which could be triggered to leak
memory via crafted messages.
For Debian 8 "Jessie", these problems have been fixed in version
1:2.1+dfsg-12+deb8u11.
We recommend that you upgrade your qemu packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | ppc64el | qemu-system-common | < 1:2.8+dfsg-6+deb9u6 | qemu-system-common_1:2.8+dfsg-6+deb9u6_ppc64el.deb |
Debian | 9 | i386 | qemu-system | < 1:2.8+dfsg-6+deb9u6 | qemu-system_1:2.8+dfsg-6+deb9u6_i386.deb |
Debian | 9 | armhf | qemu-system-misc | < 1:2.8+dfsg-6+deb9u6 | qemu-system-misc_1:2.8+dfsg-6+deb9u6_armhf.deb |
Debian | 9 | amd64 | qemu-guest-agent | < 1:2.8+dfsg-6+deb9u6 | qemu-guest-agent_1:2.8+dfsg-6+deb9u6_amd64.deb |
Debian | 9 | arm64 | qemu-system-arm | < 1:2.8+dfsg-6+deb9u6 | qemu-system-arm_1:2.8+dfsg-6+deb9u6_arm64.deb |
Debian | 9 | armhf | qemu-system-sparc | < 1:2.8+dfsg-6+deb9u6 | qemu-system-sparc_1:2.8+dfsg-6+deb9u6_armhf.deb |
Debian | 8 | armhf | qemu | < 1:2.1+dfsg-12+deb8u11 | qemu_1:2.1+dfsg-12+deb8u11_armhf.deb |
Debian | 9 | i386 | qemu-system-misc-dbgsym | < 1:2.8+dfsg-6+deb9u6 | qemu-system-misc-dbgsym_1:2.8+dfsg-6+deb9u6_i386.deb |
Debian | 9 | s390x | qemu-system-sparc-dbgsym | < 1:2.8+dfsg-6+deb9u6 | qemu-system-sparc-dbgsym_1:2.8+dfsg-6+deb9u6_s390x.deb |
Debian | 9 | armel | qemu-guest-agent | < 1:2.8+dfsg-6+deb9u6 | qemu-guest-agent_1:2.8+dfsg-6+deb9u6_armel.deb |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
Low
0.011 Low
EPSS
Percentile
84.3%