{"id":"USN-5307-1","summary":"qemu vulnerabilities","details":"Gaoning Pan discovered that QEMU incorrectly handled the floppy disk\nemulator. An attacker inside the guest could use this issue to cause QEMU\nto crash, resulting in a denial of service. (CVE-2021-20196)\n\nGaoning Pan discovered that the QEMU vmxnet3 NIC emulator incorrectly\nhandled certain values. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service. (CVE-2021-20203)\n\nIt was discovered that the QEMU vhost-user GPU device contained several\nsecurity issues. An attacker inside the guest could use these issues to\ncause QEMU to crash, resulting in a denial of service, leak sensitive\ninformation, or possibly execute arbitrary code. This issue only affected\nUbuntu 21.10. (CVE-2021-3544, CVE-2021-3545, CVE-2021-3546)\n\nIt was discovered that QEMU incorrectly handled bulk transfers from SPICE\nclients. A remote attacker could use this issue to cause QEMU to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2021-3682)\n\nIt was discovered that the QEMU UAS device emulation incorrectly handled\ncertain stream numbers. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 21.10.\n(CVE-2021-3713)\n\nIt was discovered that the QEMU virtio-net device incorrectly handled\ncertain buffer addresses. An attacker inside the guest could use this issue\nto cause QEMU to crash, resulting in a denial of service, or possibly\nexecute arbitrary code.  (CVE-2021-3748)\n\nIt was discovered that the QEMU SCSI device emulation incorrectly handled\ncertain MODE SELECT commands. An attacker inside the guest could possibly\nuse this issue to cause QEMU to crash, resulting in a denial of service.\n(CVE-2021-3930)\n\nIt was discovered that the QEMU ACPI logic incorrectly handled certain\nvalues. An attacker inside the guest could possibly use this issue to cause\nQEMU to crash, resulting in a denial of service. This issue only affected\nUbuntu 21.10. (CVE-2021-4158)\n\nJietao Xiao, Jinku Li, Wenbo Shen, and Nanzi Yang discovered that the QEMU\nvirtiofsd device incorrectly handled permissions when creating files. An\nattacker inside the guest could use this issue to create files inside the\ndirectory shared by virtiofs with unintended permissions, possibly allowing\nprivilege escalation. This issue only affected Ubuntu 21.10.\n(CVE-2022-0358)\n","modified":"2026-02-10T04:42:30Z","published":"2022-02-28T13:03:07Z","related":["UBUNTU-CVE-2021-20196","UBUNTU-CVE-2021-20203","UBUNTU-CVE-2021-3544","UBUNTU-CVE-2021-3545","UBUNTU-CVE-2021-3546","UBUNTU-CVE-2021-3682","UBUNTU-CVE-2021-3713","UBUNTU-CVE-2021-3748","UBUNTU-CVE-2021-3930","UBUNTU-CVE-2021-4158","UBUNTU-CVE-2022-0358"],"upstream":["CVE-2021-20196","CVE-2021-20203","CVE-2021-3544","CVE-2021-3545","CVE-2021-3546","CVE-2021-3682","CVE-2021-3713","CVE-2021-3748","CVE-2021-3930","CVE-2021-4158","CVE-2022-0358","UBUNTU-CVE-2021-20196","UBUNTU-CVE-2021-20203","UBUNTU-CVE-2021-3544","UBUNTU-CVE-2021-3545","UBUNTU-CVE-2021-3546","UBUNTU-CVE-2021-3682","UBUNTU-CVE-2021-3713","UBUNTU-CVE-2021-3748","UBUNTU-CVE-2021-3930","UBUNTU-CVE-2021-4158","UBUNTU-CVE-2022-0358"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5307-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3544"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3546"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3682"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3713"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3748"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3930"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4158"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20203"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0358"}],"affected":[{"package":{"name":"qemu","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:2.11+dfsg-1ubuntu7.39?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.11+dfsg-1ubuntu7.39"}]}],"versions":["1:2.10+dfsg-0ubuntu3","1:2.10+dfsg-0ubuntu4","1:2.10+dfsg-0ubuntu5","1:2.11+dfsg-1ubuntu1","1:2.11+dfsg-1ubuntu2","1:2.11+dfsg-1ubuntu4","1:2.11+dfsg-1ubuntu5","1:2.11+dfsg-1ubuntu6","1:2.11+dfsg-1ubuntu7","1:2.11+dfsg-1ubuntu7.1","1:2.11+dfsg-1ubuntu7.2","1:2.11+dfsg-1ubuntu7.3","1:2.11+dfsg-1ubuntu7.4","1:2.11+dfsg-1ubuntu7.5","1:2.11+dfsg-1ubuntu7.6","1:2.11+dfsg-1ubuntu7.7","1:2.11+dfsg-1ubuntu7.8","1:2.11+dfsg-1ubuntu7.9","1:2.11+dfsg-1ubuntu7.10","1:2.11+dfsg-1ubuntu7.12","1:2.11+dfsg-1ubuntu7.13","1:2.11+dfsg-1ubuntu7.14","1:2.11+dfsg-1ubuntu7.15","1:2.11+dfsg-1ubuntu7.17","1:2.11+dfsg-1ubuntu7.18","1:2.11+dfsg-1ubuntu7.19","1:2.11+dfsg-1ubuntu7.20","1:2.11+dfsg-1ubuntu7.21","1:2.11+dfsg-1ubuntu7.22","1:2.11+dfsg-1ubuntu7.23","1:2.11+dfsg-1ubuntu7.25","1:2.11+dfsg-1ubuntu7.26","1:2.11+dfsg-1ubuntu7.27","1:2.11+dfsg-1ubuntu7.28","1:2.11+dfsg-1ubuntu7.29","1:2.11+dfsg-1ubuntu7.31","1:2.11+dfsg-1ubuntu7.32","1:2.11+dfsg-1ubuntu7.33","1:2.11+dfsg-1ubuntu7.34","1:2.11+dfsg-1ubuntu7.35","1:2.11+dfsg-1ubuntu7.36","1:2.11+dfsg-1ubuntu7.37","1:2.11+dfsg-1ubuntu7.38"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-block-extra","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-guest-agent","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-kvm","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-arm","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-common","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-mips","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-misc","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-ppc","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-s390x","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-sparc","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-system-x86","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-user","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-user-binfmt","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-user-static","binary_version":"1:2.11+dfsg-1ubuntu7.39"},{"binary_name":"qemu-utils","binary_version":"1:2.11+dfsg-1ubuntu7.39"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5307-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3682"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3748"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3930"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20203"}]}}},{"package":{"name":"qemu","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/qemu@1:4.2-3ubuntu6.21?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2-3ubuntu6.21"}]}],"versions":["1:4.0+dfsg-0ubuntu9","1:4.0+dfsg-0ubuntu10","1:4.2-1ubuntu1","1:4.2-1ubuntu2","1:4.2-3ubuntu1","1:4.2-3ubuntu2","1:4.2-3ubuntu3","1:4.2-3ubuntu4","1:4.2-3ubuntu5","1:4.2-3ubuntu6","1:4.2-3ubuntu6.1","1:4.2-3ubuntu6.2","1:4.2-3ubuntu6.3","1:4.2-3ubuntu6.4","1:4.2-3ubuntu6.5","1:4.2-3ubuntu6.6","1:4.2-3ubuntu6.7","1:4.2-3ubuntu6.8","1:4.2-3ubuntu6.9","1:4.2-3ubuntu6.10","1:4.2-3ubuntu6.11","1:4.2-3ubuntu6.12","1:4.2-3ubuntu6.14","1:4.2-3ubuntu6.15","1:4.2-3ubuntu6.16","1:4.2-3ubuntu6.17","1:4.2-3ubuntu6.18","1:4.2-3ubuntu6.19"],"ecosystem_specific":{"binaries":[{"binary_name":"qemu","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-block-extra","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-guest-agent","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-kvm","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-arm","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-common","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-data","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-gui","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-mips","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-misc","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-ppc","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-s390x","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-sparc","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-x86","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-x86-microvm","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-system-x86-xen","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-user","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-user-binfmt","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-user-static","binary_version":"1:4.2-3ubuntu6.21"},{"binary_name":"qemu-utils","binary_version":"1:4.2-3ubuntu6.21"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5307-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3682"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3748"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3930"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20203"}]}}}],"schema_version":"1.7.3"}