{"id":"USN-4191-1","summary":"qemu vulnerabilities","details":"It was discovered that the LSI SCSI adapter emulator implementation in QEMU\ndid not properly validate executed scripts. A local attacker could use this\nto cause a denial of service. (CVE-2019-12068)\n\nSergej Schumilo, Cornelius Aschermann and Simon Wörner discovered that the\nqxl paravirtual graphics driver implementation in QEMU contained a null\npointer dereference. A local attacker in a guest could use this to cause a\ndenial of service. (CVE-2019-12155)\n\nRiccardo Schirone discovered that the QEMU bridge helper did not properly\nvalidate network interface names. A local attacker could possibly use this\nto bypass ACL restrictions. (CVE-2019-13164)\n\nIt was discovered that a heap-based buffer overflow existed in the SLiRP\nnetworking implementation of QEMU. A local attacker in a guest could use\nthis to cause a denial of service or possibly execute arbitrary code in the\nhost. (CVE-2019-14378)\n\nIt was discovered that a use-after-free vulnerability existed in the SLiRP\nnetworking implementation of QEMU. A local attacker in a guest could use\nthis to cause a denial of service. (CVE-2019-15890)\n","modified":"2026-02-10T04:41:41Z","published":"2019-11-14T00:14:42Z","related":["UBUNTU-CVE-2019-12068","UBUNTU-CVE-2019-12155","UBUNTU-CVE-2019-13164","UBUNTU-CVE-2019-14378","UBUNTU-CVE-2019-15890"],"upstream":["CVE-2019-12068","CVE-2019-12155","CVE-2019-13164","CVE-2019-14378","CVE-2019-15890","UBUNTU-CVE-2019-12068","UBUNTU-CVE-2019-12155","UBUNTU-CVE-2019-13164","UBUNTU-CVE-2019-14378","UBUNTU-CVE-2019-15890"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4191-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12068"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-13164"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14378"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15890"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.42?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.5+dfsg-5ubuntu10.42"}]}],"versions":["1:2.3+dfsg-5ubuntu9","1:2.3+dfsg-5ubuntu10","1:2.4+dfsg-4ubuntu1","1:2.4+dfsg-4ubuntu2","1:2.4+dfsg-4ubuntu3","1:2.4+dfsg-5ubuntu3","1:2.5+dfsg-1ubuntu2","1:2.5+dfsg-1ubuntu3","1:2.5+dfsg-1ubuntu4","1:2.5+dfsg-1ubuntu5","1:2.5+dfsg-5ubuntu1","1:2.5+dfsg-5ubuntu2","1:2.5+dfsg-5ubuntu4","1:2.5+dfsg-5ubuntu6","1:2.5+dfsg-5ubuntu7","1:2.5+dfsg-5ubuntu10","1:2.5+dfsg-5ubuntu10.1","1:2.5+dfsg-5ubuntu10.2","1:2.5+dfsg-5ubuntu10.3","1:2.5+dfsg-5ubuntu10.4","1:2.5+dfsg-5ubuntu10.5","1:2.5+dfsg-5ubuntu10.6","1:2.5+dfsg-5ubuntu10.7","1:2.5+dfsg-5ubuntu10.8","1:2.5+dfsg-5ubuntu10.9","1:2.5+dfsg-5ubuntu10.10","1:2.5+dfsg-5ubuntu10.11","1:2.5+dfsg-5ubuntu10.13","1:2.5+dfsg-5ubuntu10.14","1:2.5+dfsg-5ubuntu10.15","1:2.5+dfsg-5ubuntu10.16","1:2.5+dfsg-5ubuntu10.20","1:2.5+dfsg-5ubuntu10.21","1:2.5+dfsg-5ubuntu10.22","1:2.5+dfsg-5ubuntu10.24","1:2.5+dfsg-5ubuntu10.25","1:2.5+dfsg-5ubuntu10.26","1:2.5+dfsg-5ubuntu10.28","1:2.5+dfsg-5ubuntu10.29","1:2.5+dfsg-5ubuntu10.30","1:2.5+dfsg-5ubuntu10.31","1:2.5+dfsg-5ubuntu10.32","1:2.5+dfsg-5ubuntu10.33","1:2.5+dfsg-5ubuntu10.34","1:2.5+dfsg-5ubuntu10.35","1:2.5+dfsg-5ubuntu10.36","1:2.5+dfsg-5ubuntu10.37","1:2.5+dfsg-5ubuntu10.38","1:2.5+dfsg-5ubuntu10.39","1:2.5+dfsg-5ubuntu10.40","1:2.5+dfsg-5ubuntu10.41"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-block-extra"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-guest-agent"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-kvm"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-aarch64"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-arm"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-common"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-mips"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-misc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-ppc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-s390x"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-sparc"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-system-x86"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-user"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-user-binfmt"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-user-static"},{"binary_version":"1:2.5+dfsg-5ubuntu10.42","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4191-1.json","cves_map":{"cves":[{"id":"CVE-2019-12068","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-12155","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-13164","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-14378","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-15890","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.11+dfsg-1ubuntu7.20?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.11+dfsg-1ubuntu7.20"}]}],"versions":["1:2.10+dfsg-0ubuntu3","1:2.10+dfsg-0ubuntu4","1:2.10+dfsg-0ubuntu5","1:2.11+dfsg-1ubuntu1","1:2.11+dfsg-1ubuntu2","1:2.11+dfsg-1ubuntu4","1:2.11+dfsg-1ubuntu5","1:2.11+dfsg-1ubuntu6","1:2.11+dfsg-1ubuntu7","1:2.11+dfsg-1ubuntu7.1","1:2.11+dfsg-1ubuntu7.2","1:2.11+dfsg-1ubuntu7.3","1:2.11+dfsg-1ubuntu7.4","1:2.11+dfsg-1ubuntu7.5","1:2.11+dfsg-1ubuntu7.6","1:2.11+dfsg-1ubuntu7.7","1:2.11+dfsg-1ubuntu7.8","1:2.11+dfsg-1ubuntu7.9","1:2.11+dfsg-1ubuntu7.10","1:2.11+dfsg-1ubuntu7.12","1:2.11+dfsg-1ubuntu7.13","1:2.11+dfsg-1ubuntu7.14","1:2.11+dfsg-1ubuntu7.15","1:2.11+dfsg-1ubuntu7.17","1:2.11+dfsg-1ubuntu7.18","1:2.11+dfsg-1ubuntu7.19"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-block-extra"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-guest-agent"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-kvm"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-arm"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-common"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-mips"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-misc"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-ppc"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-s390x"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-sparc"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-system-x86"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-user"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-user-binfmt"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-user-static"},{"binary_version":"1:2.11+dfsg-1ubuntu7.20","binary_name":"qemu-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4191-1.json","cves_map":{"cves":[{"id":"CVE-2019-12068","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-12155","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-13164","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-14378","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-15890","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}