{"id":"USN-2974-1","summary":"qemu, qemu-kvm vulnerabilities","details":"Zuozhi Fzz discovered that QEMU incorrectly handled USB OHCI emulation\nsupport. A privileged attacker inside the guest could use this issue to\ncause QEMU to crash, resulting in a denial of service. (CVE-2016-2391)\n\nQinghao Tang discovered that QEMU incorrectly handled USB Net emulation\nsupport. A privileged attacker inside the guest could use this issue to\ncause QEMU to crash, resulting in a denial of service. (CVE-2016-2392)\n\nQinghao Tang discovered that QEMU incorrectly handled USB Net emulation\nsupport. A privileged attacker inside the guest could use this issue to\ncause QEMU to crash, resulting in a denial of service, or possibly leak\nhost memory bytes. (CVE-2016-2538)\n\nHongke Yang discovered that QEMU incorrectly handled NE2000 emulation\nsupport. A privileged attacker inside the guest could use this issue to\ncause QEMU to crash, resulting in a denial of service. (CVE-2016-2841)\n\nLing Liu discovered that QEMU incorrectly handled IP checksum routines. An\nattacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service, or possibly leak host memory bytes.\n(CVE-2016-2857)\n\nIt was discovered that QEMU incorrectly handled the PRNG back-end support.\nAn attacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service. This issue only applied to Ubuntu 14.04\nLTS, Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2016-2858)\n\nWei Xiao and Qinghao Tang discovered that QEMU incorrectly handled access\nin the VGA module. A privileged attacker inside the guest could use this\nissue to cause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code on the host. In the default installation, when QEMU\nis used with libvirt, attackers would be isolated by the libvirt AppArmor\nprofile. (CVE-2016-3710)\n\nZuozhi Fzz discovered that QEMU incorrectly handled access in the VGA\nmodule. A privileged attacker inside the guest could use this issue to\ncause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code on the host. In the default installation, when QEMU\nis used with libvirt, attackers would be isolated by the libvirt AppArmor\nprofile. (CVE-2016-3712)\n\nOleksandr Bazhaniuk discovered that QEMU incorrectly handled Luminary\nMicro Stellaris ethernet controller emulation. A remote attacker could use\nthis issue to cause QEMU to crash, resulting in a denial of service.\n(CVE-2016-4001)\n\nOleksandr Bazhaniuk discovered that QEMU incorrectly handled MIPSnet\ncontroller emulation. A remote attacker could use this issue to cause QEMU\nto crash, resulting in a denial of service. (CVE-2016-4002)\n\nDonghai Zdh discovered that QEMU incorrectly handled the Task Priority\nRegister(TPR). A privileged attacker inside the guest could use this issue\nto possibly leak host memory bytes. This issue only applied to Ubuntu 14.04\nLTS, Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2016-4020)\n\nDu Shaobo discovered that QEMU incorrectly handled USB EHCI emulation\nsupport. A privileged attacker inside the guest could use this issue to\ncause QEMU to consume resources, resulting in a denial of service.\n(CVE-2016-4037)\n","modified":"2026-02-10T04:40:59Z","published":"2016-05-12T14:33:38Z","related":["UBUNTU-CVE-2016-2391","UBUNTU-CVE-2016-2392","UBUNTU-CVE-2016-2538","UBUNTU-CVE-2016-2841","UBUNTU-CVE-2016-2857","UBUNTU-CVE-2016-2858","UBUNTU-CVE-2016-3710","UBUNTU-CVE-2016-3712","UBUNTU-CVE-2016-4001","UBUNTU-CVE-2016-4002","UBUNTU-CVE-2016-4020","UBUNTU-CVE-2016-4037"],"upstream":["CVE-2016-2391","CVE-2016-2392","CVE-2016-2538","CVE-2016-2841","CVE-2016-2857","CVE-2016-2858","CVE-2016-3710","CVE-2016-3712","CVE-2016-4001","CVE-2016-4002","CVE-2016-4020","CVE-2016-4037","UBUNTU-CVE-2016-2391","UBUNTU-CVE-2016-2392","UBUNTU-CVE-2016-2538","UBUNTU-CVE-2016-2841","UBUNTU-CVE-2016-2857","UBUNTU-CVE-2016-2858","UBUNTU-CVE-2016-3710","UBUNTU-CVE-2016-3712","UBUNTU-CVE-2016-4001","UBUNTU-CVE-2016-4002","UBUNTU-CVE-2016-4020","UBUNTU-CVE-2016-4037"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2974-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2391"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2392"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2841"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2857"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2858"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3710"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3712"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4001"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4020"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4037"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.24?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0+dfsg-2ubuntu1.24"}]}],"versions":["1.5.0+dfsg-3ubuntu5","1.5.0+dfsg-3ubuntu6","1.6.0+dfsg-2ubuntu1","1.6.0+dfsg-2ubuntu2","1.6.0+dfsg-2ubuntu3","1.6.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu1","1.7.0+dfsg-2ubuntu2","1.7.0+dfsg-2ubuntu3","1.7.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu5","1.7.0+dfsg-2ubuntu7","1.7.0+dfsg-2ubuntu8","1.7.0+dfsg-2ubuntu9","1.7.0+dfsg-3ubuntu1~ppa1","1.7.0+dfsg-3ubuntu1","1.7.0+dfsg-3ubuntu2","1.7.0+dfsg-3ubuntu3","1.7.0+dfsg-3ubuntu4","1.7.0+dfsg-3ubuntu5","1.7.0+dfsg-3ubuntu6","1.7.0+dfsg-3ubuntu7","2.0.0~rc1+dfsg-0ubuntu1","2.0.0~rc1+dfsg-0ubuntu2","2.0.0~rc1+dfsg-0ubuntu3","2.0.0~rc1+dfsg-0ubuntu3.1","2.0.0+dfsg-2ubuntu1","2.0.0+dfsg-2ubuntu1.1","2.0.0+dfsg-2ubuntu1.2","2.0.0+dfsg-2ubuntu1.3","2.0.0+dfsg-2ubuntu1.5","2.0.0+dfsg-2ubuntu1.6","2.0.0+dfsg-2ubuntu1.7","2.0.0+dfsg-2ubuntu1.8","2.0.0+dfsg-2ubuntu1.9","2.0.0+dfsg-2ubuntu1.10","2.0.0+dfsg-2ubuntu1.11","2.0.0+dfsg-2ubuntu1.13","2.0.0+dfsg-2ubuntu1.14","2.0.0+dfsg-2ubuntu1.15","2.0.0+dfsg-2ubuntu1.16","2.0.0+dfsg-2ubuntu1.17","2.0.0+dfsg-2ubuntu1.18","2.0.0+dfsg-2ubuntu1.19","2.0.0+dfsg-2ubuntu1.20","2.0.0+dfsg-2ubuntu1.21","2.0.0+dfsg-2ubuntu1.22"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-common","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-guest-agent","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-keymaps","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-kvm","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-aarch64","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-arm","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-common","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-mips","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-misc","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-ppc","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-sparc","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-system-x86","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-user","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-user-static","binary_version":"2.0.0+dfsg-2ubuntu1.24"},{"binary_name":"qemu-utils","binary_version":"2.0.0+dfsg-2ubuntu1.24"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2974-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2391"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2392"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2538"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2841"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2857"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2858"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-3710"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-3712"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4001"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4002"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-4020"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4037"}]}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.5+dfsg-5ubuntu10.1"}]}],"versions":["1:2.3+dfsg-5ubuntu9","1:2.3+dfsg-5ubuntu10","1:2.4+dfsg-4ubuntu1","1:2.4+dfsg-4ubuntu2","1:2.4+dfsg-4ubuntu3","1:2.4+dfsg-5ubuntu3","1:2.5+dfsg-1ubuntu2","1:2.5+dfsg-1ubuntu3","1:2.5+dfsg-1ubuntu4","1:2.5+dfsg-1ubuntu5","1:2.5+dfsg-5ubuntu1","1:2.5+dfsg-5ubuntu2","1:2.5+dfsg-5ubuntu4","1:2.5+dfsg-5ubuntu6","1:2.5+dfsg-5ubuntu7","1:2.5+dfsg-5ubuntu10"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-block-extra","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-kvm","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-aarch64","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-arm","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-common","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-mips","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-misc","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-system-x86","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-user","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-user-static","binary_version":"1:2.5+dfsg-5ubuntu10.1"},{"binary_name":"qemu-utils","binary_version":"1:2.5+dfsg-5ubuntu10.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2974-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2391"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2392"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2538"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2841"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2857"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2858"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-3710"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-3712"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4001"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4002"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-4020"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-4037"}]}}}],"schema_version":"1.7.3"}