{"id":"USN-2745-1","summary":"qemu, qemu-kvm vulnerabilities","details":"Lian Yihan discovered that QEMU incorrectly handled certain payload\nmessages in the VNC display driver. A malicious guest could use this issue\nto cause the QEMU process to hang, resulting in a denial of service. This\nissue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-5239)\n\nQinghao Tang discovered that QEMU incorrectly handled receiving certain\npackets in the NE2000 network driver. A malicious guest could use this\nissue to cause the QEMU process to hang, resulting in a denial of service.\n(CVE-2015-5278)\n\nQinghao Tang discovered that QEMU incorrectly handled receiving certain\npackets in the NE2000 network driver. A malicious guest could use this\nissue to cause a denial of service, or possibly execute arbitrary code on\nthe host as the user running the QEMU process. In the default installation,\nwhen QEMU is used with libvirt, attackers would be isolated by the libvirt\nAppArmor profile. (CVE-2015-5279)\n\nQinghao Tang discovered that QEMU incorrectly handled transmit descriptor\ndata when sending network packets. A malicious guest could use this issue\nto cause the QEMU process to hang, resulting in a denial of service.\n(CVE-2015-6815)\n\nQinghao Tang discovered that QEMU incorrectly handled ATAPI command\npermissions. A malicious guest could use this issue to cause the QEMU\nprocess to crash, resulting in a denial of service. (CVE-2015-6855)\n","modified":"2026-02-10T04:40:55Z","published":"2015-09-24T18:37:21Z","related":["UBUNTU-CVE-2015-5239","UBUNTU-CVE-2015-5278","UBUNTU-CVE-2015-5279","UBUNTU-CVE-2015-6815","UBUNTU-CVE-2015-6855"],"upstream":["CVE-2015-5239","CVE-2015-5278","CVE-2015-5279","CVE-2015-6815","CVE-2015-6855","UBUNTU-CVE-2015-5239","UBUNTU-CVE-2015-5278","UBUNTU-CVE-2015-5279","UBUNTU-CVE-2015-6815","UBUNTU-CVE-2015-6855"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2745-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5239"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5278"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5279"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-6815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-6855"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.19?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0+dfsg-2ubuntu1.19"}]}],"versions":["1.5.0+dfsg-3ubuntu5","1.5.0+dfsg-3ubuntu6","1.6.0+dfsg-2ubuntu1","1.6.0+dfsg-2ubuntu2","1.6.0+dfsg-2ubuntu3","1.6.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu1","1.7.0+dfsg-2ubuntu2","1.7.0+dfsg-2ubuntu3","1.7.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu5","1.7.0+dfsg-2ubuntu7","1.7.0+dfsg-2ubuntu8","1.7.0+dfsg-2ubuntu9","1.7.0+dfsg-3ubuntu1~ppa1","1.7.0+dfsg-3ubuntu1","1.7.0+dfsg-3ubuntu2","1.7.0+dfsg-3ubuntu3","1.7.0+dfsg-3ubuntu4","1.7.0+dfsg-3ubuntu5","1.7.0+dfsg-3ubuntu6","1.7.0+dfsg-3ubuntu7","2.0.0~rc1+dfsg-0ubuntu1","2.0.0~rc1+dfsg-0ubuntu2","2.0.0~rc1+dfsg-0ubuntu3","2.0.0~rc1+dfsg-0ubuntu3.1","2.0.0+dfsg-2ubuntu1","2.0.0+dfsg-2ubuntu1.1","2.0.0+dfsg-2ubuntu1.2","2.0.0+dfsg-2ubuntu1.3","2.0.0+dfsg-2ubuntu1.5","2.0.0+dfsg-2ubuntu1.6","2.0.0+dfsg-2ubuntu1.7","2.0.0+dfsg-2ubuntu1.8","2.0.0+dfsg-2ubuntu1.9","2.0.0+dfsg-2ubuntu1.10","2.0.0+dfsg-2ubuntu1.11","2.0.0+dfsg-2ubuntu1.13","2.0.0+dfsg-2ubuntu1.14","2.0.0+dfsg-2ubuntu1.15","2.0.0+dfsg-2ubuntu1.16","2.0.0+dfsg-2ubuntu1.17","2.0.0+dfsg-2ubuntu1.18"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-common","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-guest-agent","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-keymaps","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-kvm","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-aarch64","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-arm","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-common","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-mips","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-misc","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-ppc","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-sparc","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-system-x86","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-user","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-user-static","binary_version":"2.0.0+dfsg-2ubuntu1.19"},{"binary_name":"qemu-utils","binary_version":"2.0.0+dfsg-2ubuntu1.19"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2015-5239","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2015-5278","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2015-5279","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2015-6815","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2015-6855","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2745-1.json"}}],"schema_version":"1.7.3"}