{"id":"USN-5010-1","summary":"qemu vulnerabilities","details":"Lei Sun discovered that QEMU incorrectly handled certain MMIO operations.\nAn attacker inside the guest could possibly use this issue to cause QEMU to\ncrash, resulting in a denial of service. (CVE-2020-15469)\n\nWenxiang Qian discovered that QEMU incorrectly handled certain ATAPI\ncommands. An attacker inside the guest could possibly use this issue to\ncause QEMU to crash, resulting in a denial of service. This issue only\naffected Ubuntu 21.04. (CVE-2020-29443)\n\nCheolwoo Myung discovered that QEMU incorrectly handled SCSI device\nemulation. An attacker inside the guest could possibly use this issue to\ncause QEMU to crash, resulting in a denial of service. (CVE-2020-35504,\nCVE-2020-35505, CVE-2021-3392)\n\nAlex Xu discovered that QEMU incorrectly handled the virtio-fs shared file\nsystem daemon. An attacker inside the guest could possibly use this issue\nto read and write to host devices. This issue only affected Ubuntu 20.10.\n(CVE-2020-35517)\n\nIt was discovered that QEMU incorrectly handled ARM Generic Interrupt\nController emulation. An attacker inside the guest could possibly use this\nissue to cause QEMU to crash, resulting in a denial of service. This issue\nonly affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10.\n(CVE-2021-20221)\n\nAlexander Bulekov, Cheolwoo Myung, Sergej Schumilo, Cornelius Aschermann,\nand Simon Werner discovered that QEMU incorrectly handled e1000 device\nemulation. An attacker inside the guest could possibly use this issue to\ncause QEMU to hang, resulting in a denial of service. This issue only\naffected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10.\n(CVE-2021-20257)\n\nIt was discovered that QEMU incorrectly handled SDHCI controller emulation.\nAn attacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service, or possibly execute arbitrary code. In\nthe default installation, when QEMU is used in combination with libvirt,\nattackers would be isolated by the libvirt AppArmor profile.\n(CVE-2021-3409)\n\nIt was discovered that QEMU incorrectly handled certain NIC emulation\ndevices. An attacker inside the guest could possibly use this issue to\ncause QEMU to hang or crash, resulting in a denial of service. This issue\nonly affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10.\n(CVE-2021-3416)\n\nRemy Noel discovered that QEMU incorrectly handled the USB redirector\ndevice. An attacker inside the guest could possibly use this issue to\ncause QEMU to consume resources, resulting in a denial of service.\n(CVE-2021-3527)\n\nIt was discovered that QEMU incorrectly handled the virtio vhost-user GPU\ndevice. An attacker inside the guest could possibly use this issue to cause\nQEMU to consume resources, leading to a denial of service. This issue only\naffected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-3544)\n\nIt was discovered that QEMU incorrectly handled the virtio vhost-user GPU\ndevice. An attacker inside the guest could possibly use this issue to\nobtain sensitive host information. This issue only affected Ubuntu 20.04\nLTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-3545)\n\nIt was discovered that QEMU incorrectly handled the virtio vhost-user GPU\ndevice. An attacker inside the guest could use this issue to cause QEMU to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. In the default installation, when QEMU is used in combination with\nlibvirt, attackers would be isolated by the libvirt AppArmor profile. This\nissue only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04.\n(CVE-2021-3546)\n\nIt was discovered that QEMU incorrectly handled the PVRDMA device. An\nattacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service, or possibly execute arbitrary code. In\nthe default installation, when QEMU is used in combination with libvirt,\nattackers would be isolated by the libvirt AppArmor profile. This issue\nonly affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04.\n(CVE-2021-3582, CVE-2021-3607, CVE-2021-3608)\n\nIt was discovered that QEMU SLiRP networking incorrectly handled certain\nudp packets. An attacker inside a guest could possibly use this issue to\nleak sensitive information from the host. (CVE-2021-3592, CVE-2021-3593,\nCVE-2021-3594, CVE-2021-3595)\n","modified":"2026-04-27T16:03:35.569511515Z","published":"2021-07-15T17:53:50Z","related":["UBUNTU-CVE-2020-15469","UBUNTU-CVE-2020-29443","UBUNTU-CVE-2020-35504","UBUNTU-CVE-2020-35505","UBUNTU-CVE-2021-20221","UBUNTU-CVE-2021-20257","UBUNTU-CVE-2021-3392","UBUNTU-CVE-2021-3409","UBUNTU-CVE-2021-3416","UBUNTU-CVE-2021-3527","UBUNTU-CVE-2021-3544","UBUNTU-CVE-2021-3545","UBUNTU-CVE-2021-3546","UBUNTU-CVE-2021-3582","UBUNTU-CVE-2021-3592","UBUNTU-CVE-2021-3593","UBUNTU-CVE-2021-3594","UBUNTU-CVE-2021-3595","UBUNTU-CVE-2021-3607","UBUNTU-CVE-2021-3608"],"upstream":["CVE-2020-15469","CVE-2020-29443","CVE-2020-35504","CVE-2020-35505","CVE-2021-20221","CVE-2021-20257","CVE-2021-3392","CVE-2021-3409","CVE-2021-3416","CVE-2021-3527","CVE-2021-3544","CVE-2021-3545","CVE-2021-3546","CVE-2021-3582","CVE-2021-3592","CVE-2021-3593","CVE-2021-3594","CVE-2021-3595","CVE-2021-3607","CVE-2021-3608","UBUNTU-CVE-2020-15469","UBUNTU-CVE-2020-29443","UBUNTU-CVE-2020-35504","UBUNTU-CVE-2020-35505","UBUNTU-CVE-2020-35517","UBUNTU-CVE-2021-20221","UBUNTU-CVE-2021-20257","UBUNTU-CVE-2021-3392","UBUNTU-CVE-2021-3409","UBUNTU-CVE-2021-3416","UBUNTU-CVE-2021-3527","UBUNTU-CVE-2021-3544","UBUNTU-CVE-2021-3545","UBUNTU-CVE-2021-3546","UBUNTU-CVE-2021-3582","UBUNTU-CVE-2021-3592","UBUNTU-CVE-2021-3593","UBUNTU-CVE-2021-3594","UBUNTU-CVE-2021-3595","UBUNTU-CVE-2021-3607","UBUNTU-CVE-2021-3608"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5010-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29443"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35504"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35505"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35517"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3392"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3409"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3416"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3527"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3544"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3546"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3582"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3592"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3593"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3595"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3607"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3608"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20221"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20257"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.11+dfsg-1ubuntu7.37?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.11+dfsg-1ubuntu7.37"}]}],"versions":["1:2.10+dfsg-0ubuntu3","1:2.10+dfsg-0ubuntu4","1:2.10+dfsg-0ubuntu5","1:2.11+dfsg-1ubuntu1","1:2.11+dfsg-1ubuntu2","1:2.11+dfsg-1ubuntu4","1:2.11+dfsg-1ubuntu5","1:2.11+dfsg-1ubuntu6","1:2.11+dfsg-1ubuntu7","1:2.11+dfsg-1ubuntu7.1","1:2.11+dfsg-1ubuntu7.2","1:2.11+dfsg-1ubuntu7.3","1:2.11+dfsg-1ubuntu7.4","1:2.11+dfsg-1ubuntu7.5","1:2.11+dfsg-1ubuntu7.6","1:2.11+dfsg-1ubuntu7.7","1:2.11+dfsg-1ubuntu7.8","1:2.11+dfsg-1ubuntu7.9","1:2.11+dfsg-1ubuntu7.10","1:2.11+dfsg-1ubuntu7.12","1:2.11+dfsg-1ubuntu7.13","1:2.11+dfsg-1ubuntu7.14","1:2.11+dfsg-1ubuntu7.15","1:2.11+dfsg-1ubuntu7.17","1:2.11+dfsg-1ubuntu7.18","1:2.11+dfsg-1ubuntu7.19","1:2.11+dfsg-1ubuntu7.20","1:2.11+dfsg-1ubuntu7.21","1:2.11+dfsg-1ubuntu7.22","1:2.11+dfsg-1ubuntu7.23","1:2.11+dfsg-1ubuntu7.25","1:2.11+dfsg-1ubuntu7.26","1:2.11+dfsg-1ubuntu7.27","1:2.11+dfsg-1ubuntu7.28","1:2.11+dfsg-1ubuntu7.29","1:2.11+dfsg-1ubuntu7.31","1:2.11+dfsg-1ubuntu7.32","1:2.11+dfsg-1ubuntu7.33","1:2.11+dfsg-1ubuntu7.34","1:2.11+dfsg-1ubuntu7.35","1:2.11+dfsg-1ubuntu7.36"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"qemu","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-block-extra","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-kvm","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-arm","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-common","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-mips","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-misc","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-system-x86","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-user","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-user-static","binary_version":"1:2.11+dfsg-1ubuntu7.37"},{"binary_name":"qemu-utils","binary_version":"1:2.11+dfsg-1ubuntu7.37"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5010-1.json","cves_map":{"cves":[{"id":"CVE-2020-15469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-35504","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-35505","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3392","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3409","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3416","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3527","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3592","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3593","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3594","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3595","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20221","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20257","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:4.2-3ubuntu6.17?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2-3ubuntu6.17"}]}],"versions":["1:4.0+dfsg-0ubuntu9","1:4.0+dfsg-0ubuntu10","1:4.2-1ubuntu1","1:4.2-1ubuntu2","1:4.2-3ubuntu1","1:4.2-3ubuntu2","1:4.2-3ubuntu3","1:4.2-3ubuntu4","1:4.2-3ubuntu5","1:4.2-3ubuntu6","1:4.2-3ubuntu6.1","1:4.2-3ubuntu6.2","1:4.2-3ubuntu6.3","1:4.2-3ubuntu6.4","1:4.2-3ubuntu6.5","1:4.2-3ubuntu6.6","1:4.2-3ubuntu6.7","1:4.2-3ubuntu6.8","1:4.2-3ubuntu6.9","1:4.2-3ubuntu6.10","1:4.2-3ubuntu6.11","1:4.2-3ubuntu6.12","1:4.2-3ubuntu6.14","1:4.2-3ubuntu6.15","1:4.2-3ubuntu6.16"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"qemu","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-block-extra","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-guest-agent","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-kvm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-arm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-common","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-data","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-gui","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-mips","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-misc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-ppc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-s390x","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-sparc","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86-microvm","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-system-x86-xen","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user-binfmt","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-user-static","binary_version":"1:4.2-3ubuntu6.17"},{"binary_name":"qemu-utils","binary_version":"1:4.2-3ubuntu6.17"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2020-15469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-35504","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-35505","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3392","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3409","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3416","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3527","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3544","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3545","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3546","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3582","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3607","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-3608","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20221","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20257","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5010-1.json"}}],"schema_version":"1.7.5"}