{"id":"USN-2828-1","summary":"qemu, qemu-kvm vulnerabilities","details":"Jason Wang discovered that QEMU incorrectly handled the virtio-net device.\nA remote attacker could use this issue to cause guest network consumption,\nresulting in a denial of service. (CVE-2015-7295)\n\nQinghao Tang and Ling Liu discovered that QEMU incorrectly handled the\npcnet driver when used in loopback mode. A malicious guest could use this\nissue to cause a denial of service, or possibly execute arbitrary code on\nthe host as the user running the QEMU process. In the default installation,\nwhen QEMU is used with libvirt, attackers would be isolated by the libvirt\nAppArmor profile. (CVE-2015-7504)\n\nLing Liu and Jason Wang discovered that QEMU incorrectly handled the\npcnet driver. A remote attacker could use this issue to cause a denial of\nservice, or possibly execute arbitrary code on the host as the user running\nthe QEMU process. In the default installation, when QEMU is used with\nlibvirt, attackers would be isolated by the libvirt AppArmor profile.\n(CVE-2015-7512)\n\nQinghao Tang discovered that QEMU incorrectly handled the eepro100 driver.\nA malicious guest could use this issue to cause an infinite loop, leading\nto a denial of service. (CVE-2015-8345)\n","modified":"2026-02-10T04:40:56Z","published":"2015-12-03T12:34:36Z","related":["UBUNTU-CVE-2015-7295","UBUNTU-CVE-2015-7504","UBUNTU-CVE-2015-7512","UBUNTU-CVE-2015-8345"],"upstream":["CVE-2015-7295","CVE-2015-7504","CVE-2015-7512","CVE-2015-8345","UBUNTU-CVE-2015-7295","UBUNTU-CVE-2015-7504","UBUNTU-CVE-2015-7512","UBUNTU-CVE-2015-8345"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2828-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7295"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7504"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7512"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8345"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/qemu@2.0.0+dfsg-2ubuntu1.21?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0+dfsg-2ubuntu1.21"}]}],"versions":["1.5.0+dfsg-3ubuntu5","1.5.0+dfsg-3ubuntu6","1.6.0+dfsg-2ubuntu1","1.6.0+dfsg-2ubuntu2","1.6.0+dfsg-2ubuntu3","1.6.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu1","1.7.0+dfsg-2ubuntu2","1.7.0+dfsg-2ubuntu3","1.7.0+dfsg-2ubuntu4","1.7.0+dfsg-2ubuntu5","1.7.0+dfsg-2ubuntu7","1.7.0+dfsg-2ubuntu8","1.7.0+dfsg-2ubuntu9","1.7.0+dfsg-3ubuntu1~ppa1","1.7.0+dfsg-3ubuntu1","1.7.0+dfsg-3ubuntu2","1.7.0+dfsg-3ubuntu3","1.7.0+dfsg-3ubuntu4","1.7.0+dfsg-3ubuntu5","1.7.0+dfsg-3ubuntu6","1.7.0+dfsg-3ubuntu7","2.0.0~rc1+dfsg-0ubuntu1","2.0.0~rc1+dfsg-0ubuntu2","2.0.0~rc1+dfsg-0ubuntu3","2.0.0~rc1+dfsg-0ubuntu3.1","2.0.0+dfsg-2ubuntu1","2.0.0+dfsg-2ubuntu1.1","2.0.0+dfsg-2ubuntu1.2","2.0.0+dfsg-2ubuntu1.3","2.0.0+dfsg-2ubuntu1.5","2.0.0+dfsg-2ubuntu1.6","2.0.0+dfsg-2ubuntu1.7","2.0.0+dfsg-2ubuntu1.8","2.0.0+dfsg-2ubuntu1.9","2.0.0+dfsg-2ubuntu1.10","2.0.0+dfsg-2ubuntu1.11","2.0.0+dfsg-2ubuntu1.13","2.0.0+dfsg-2ubuntu1.14","2.0.0+dfsg-2ubuntu1.15","2.0.0+dfsg-2ubuntu1.16","2.0.0+dfsg-2ubuntu1.17","2.0.0+dfsg-2ubuntu1.18","2.0.0+dfsg-2ubuntu1.19","2.0.0+dfsg-2ubuntu1.20"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"qemu","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-common","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-guest-agent","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-keymaps","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-kvm","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-aarch64","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-arm","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-common","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-mips","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-misc","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-ppc","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-sparc","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-system-x86","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-user","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-user-static","binary_version":"2.0.0+dfsg-2ubuntu1.21"},{"binary_name":"qemu-utils","binary_version":"2.0.0+dfsg-2ubuntu1.21"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2015-7295"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7504"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-7512"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-8345"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2828-1.json"}}],"schema_version":"1.7.3"}