{"id":"USN-4725-1","summary":"qemu vulnerabilities","details":"It was discovered that QEMU incorrectly handled memory in iSCSI emulation.\nAn attacker inside the guest could possibly use this issue to obtain\nsensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu\n18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-11947)\n\nAlexander Bulekov discovered that QEMU incorrectly handled Intel e1000e\nemulation. An attacker inside the guest could use this issue to cause QEMU\nto crash, resulting in a denial of service. (CVE-2020-15859)\n\nAlexander Bulekov discovered that QEMU incorrectly handled memory region\ncache. An attacker inside the guest could use this issue to cause QEMU to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n20.04 LTS, and Ubuntu 20.10. (CVE-2020-27821)\n\nCheol-woo Myung discovered that QEMU incorrectly handled Intel e1000e\nemulation. An attacker inside the guest could use this issue to cause a\ndenial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04\nLTS, and Ubuntu 20.10. (CVE-2020-28916)\n\nWenxiang Qian discovered that QEMU incorrectly handled ATAPI emulation. An\nattacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service. (CVE-2020-29443)\n\nIt was discovered that QEMU incorrectly handled VirtFS directory sharing.\nAn attacker inside the guest could use this issue to cause QEMU to crash,\nresulting in a denial of service. (CVE-2021-20181)\n","modified":"2026-04-27T16:03:01.668841873Z","published":"2021-02-08T13:12:32Z","related":["UBUNTU-CVE-2020-11947","UBUNTU-CVE-2020-15859","UBUNTU-CVE-2020-27821","UBUNTU-CVE-2020-28916","UBUNTU-CVE-2020-29443","UBUNTU-CVE-2021-20181"],"upstream":["CVE-2020-11947","CVE-2020-15859","CVE-2020-27821","CVE-2020-28916","CVE-2020-29443","CVE-2021-20181","UBUNTU-CVE-2020-11947","UBUNTU-CVE-2020-15859","UBUNTU-CVE-2020-27821","UBUNTU-CVE-2020-28916","UBUNTU-CVE-2020-29443","UBUNTU-CVE-2021-20181"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4725-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11947"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15859"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27821"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28916"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29443"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20181"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.5+dfsg-5ubuntu10.49?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.5+dfsg-5ubuntu10.49"}]}],"versions":["1:2.3+dfsg-5ubuntu9","1:2.3+dfsg-5ubuntu10","1:2.4+dfsg-4ubuntu1","1:2.4+dfsg-4ubuntu2","1:2.4+dfsg-4ubuntu3","1:2.4+dfsg-5ubuntu3","1:2.5+dfsg-1ubuntu2","1:2.5+dfsg-1ubuntu3","1:2.5+dfsg-1ubuntu4","1:2.5+dfsg-1ubuntu5","1:2.5+dfsg-5ubuntu1","1:2.5+dfsg-5ubuntu2","1:2.5+dfsg-5ubuntu4","1:2.5+dfsg-5ubuntu6","1:2.5+dfsg-5ubuntu7","1:2.5+dfsg-5ubuntu10","1:2.5+dfsg-5ubuntu10.1","1:2.5+dfsg-5ubuntu10.2","1:2.5+dfsg-5ubuntu10.3","1:2.5+dfsg-5ubuntu10.4","1:2.5+dfsg-5ubuntu10.5","1:2.5+dfsg-5ubuntu10.6","1:2.5+dfsg-5ubuntu10.7","1:2.5+dfsg-5ubuntu10.8","1:2.5+dfsg-5ubuntu10.9","1:2.5+dfsg-5ubuntu10.10","1:2.5+dfsg-5ubuntu10.11","1:2.5+dfsg-5ubuntu10.13","1:2.5+dfsg-5ubuntu10.14","1:2.5+dfsg-5ubuntu10.15","1:2.5+dfsg-5ubuntu10.16","1:2.5+dfsg-5ubuntu10.20","1:2.5+dfsg-5ubuntu10.21","1:2.5+dfsg-5ubuntu10.22","1:2.5+dfsg-5ubuntu10.24","1:2.5+dfsg-5ubuntu10.25","1:2.5+dfsg-5ubuntu10.26","1:2.5+dfsg-5ubuntu10.28","1:2.5+dfsg-5ubuntu10.29","1:2.5+dfsg-5ubuntu10.30","1:2.5+dfsg-5ubuntu10.31","1:2.5+dfsg-5ubuntu10.32","1:2.5+dfsg-5ubuntu10.33","1:2.5+dfsg-5ubuntu10.34","1:2.5+dfsg-5ubuntu10.35","1:2.5+dfsg-5ubuntu10.36","1:2.5+dfsg-5ubuntu10.37","1:2.5+dfsg-5ubuntu10.38","1:2.5+dfsg-5ubuntu10.39","1:2.5+dfsg-5ubuntu10.40","1:2.5+dfsg-5ubuntu10.41","1:2.5+dfsg-5ubuntu10.42","1:2.5+dfsg-5ubuntu10.43","1:2.5+dfsg-5ubuntu10.44","1:2.5+dfsg-5ubuntu10.45","1:2.5+dfsg-5ubuntu10.46","1:2.5+dfsg-5ubuntu10.47","1:2.5+dfsg-5ubuntu10.48"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-block-extra","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-kvm","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-aarch64","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-arm","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-common","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-mips","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-misc","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-system-x86","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-user","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-user-static","binary_version":"1:2.5+dfsg-5ubuntu10.49"},{"binary_name":"qemu-utils","binary_version":"1:2.5+dfsg-5ubuntu10.49"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4725-1.json","cves_map":{"cves":[{"id":"CVE-2020-11947","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-15859","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-29443","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20181","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.11+dfsg-1ubuntu7.35?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.11+dfsg-1ubuntu7.35"}]}],"versions":["1:2.10+dfsg-0ubuntu3","1:2.10+dfsg-0ubuntu4","1:2.10+dfsg-0ubuntu5","1:2.11+dfsg-1ubuntu1","1:2.11+dfsg-1ubuntu2","1:2.11+dfsg-1ubuntu4","1:2.11+dfsg-1ubuntu5","1:2.11+dfsg-1ubuntu6","1:2.11+dfsg-1ubuntu7","1:2.11+dfsg-1ubuntu7.1","1:2.11+dfsg-1ubuntu7.2","1:2.11+dfsg-1ubuntu7.3","1:2.11+dfsg-1ubuntu7.4","1:2.11+dfsg-1ubuntu7.5","1:2.11+dfsg-1ubuntu7.6","1:2.11+dfsg-1ubuntu7.7","1:2.11+dfsg-1ubuntu7.8","1:2.11+dfsg-1ubuntu7.9","1:2.11+dfsg-1ubuntu7.10","1:2.11+dfsg-1ubuntu7.12","1:2.11+dfsg-1ubuntu7.13","1:2.11+dfsg-1ubuntu7.14","1:2.11+dfsg-1ubuntu7.15","1:2.11+dfsg-1ubuntu7.17","1:2.11+dfsg-1ubuntu7.18","1:2.11+dfsg-1ubuntu7.19","1:2.11+dfsg-1ubuntu7.20","1:2.11+dfsg-1ubuntu7.21","1:2.11+dfsg-1ubuntu7.22","1:2.11+dfsg-1ubuntu7.23","1:2.11+dfsg-1ubuntu7.25","1:2.11+dfsg-1ubuntu7.26","1:2.11+dfsg-1ubuntu7.27","1:2.11+dfsg-1ubuntu7.28","1:2.11+dfsg-1ubuntu7.29","1:2.11+dfsg-1ubuntu7.31","1:2.11+dfsg-1ubuntu7.32","1:2.11+dfsg-1ubuntu7.33","1:2.11+dfsg-1ubuntu7.34"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-block-extra","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-kvm","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-arm","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-common","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-mips","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-misc","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-system-x86","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-user","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-user-static","binary_version":"1:2.11+dfsg-1ubuntu7.35"},{"binary_name":"qemu-utils","binary_version":"1:2.11+dfsg-1ubuntu7.35"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4725-1.json","cves_map":{"cves":[{"id":"CVE-2020-11947","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-15859","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-28916","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-29443","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20181","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:4.2-3ubuntu6.12?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2-3ubuntu6.12"}]}],"versions":["1:4.0+dfsg-0ubuntu9","1:4.0+dfsg-0ubuntu10","1:4.2-1ubuntu1","1:4.2-1ubuntu2","1:4.2-3ubuntu1","1:4.2-3ubuntu2","1:4.2-3ubuntu3","1:4.2-3ubuntu4","1:4.2-3ubuntu5","1:4.2-3ubuntu6","1:4.2-3ubuntu6.1","1:4.2-3ubuntu6.2","1:4.2-3ubuntu6.3","1:4.2-3ubuntu6.4","1:4.2-3ubuntu6.5","1:4.2-3ubuntu6.6","1:4.2-3ubuntu6.7","1:4.2-3ubuntu6.8","1:4.2-3ubuntu6.9","1:4.2-3ubuntu6.10","1:4.2-3ubuntu6.11"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-block-extra","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-guest-agent","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-kvm","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-arm","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-common","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-data","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-gui","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-mips","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-misc","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-ppc","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-s390x","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-sparc","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-x86","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-x86-microvm","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-system-x86-xen","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-user","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-user-binfmt","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-user-static","binary_version":"1:4.2-3ubuntu6.12"},{"binary_name":"qemu-utils","binary_version":"1:4.2-3ubuntu6.12"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4725-1.json","cves_map":{"cves":[{"id":"CVE-2020-11947","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-15859","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27821","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-28916","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-29443","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20181","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.5"}