Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842633
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2891-1)
Summary:The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2891-1 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2891-1 advisory.

Vulnerability Insight:
Qinghao Tang discovered that QEMU incorrectly handled PCI MSI-X support. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 15.10. (CVE-2015-7549)

Lian Yihan discovered that QEMU incorrectly handled the VNC server. A
remote attacker could use this issue to cause QEMU to crash, resulting in a
denial of service. (CVE-2015-8504)

Felix Wilhelm discovered a race condition in the Xen paravirtualized
drivers which can cause double fetch vulnerabilities. An attacker in the
paravirtualized guest could exploit this flaw to cause a denial of service
(crash the host) or potentially execute arbitrary code on the host.
(CVE-2015-8550)

Qinghao Tang discovered that QEMU incorrectly handled USB EHCI emulation
support. An attacker inside the guest could use this issue to cause QEMU to
consume resources, resulting in a denial of service. (CVE-2015-8558)

Qinghao Tang discovered that QEMU incorrectly handled the vmxnet3 device.
An attacker inside the guest could use this issue to cause QEMU to consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-8567, CVE-2015-8568)

Qinghao Tang discovered that QEMU incorrectly handled SCSI MegaRAID SAS HBA
emulation. An attacker inside the guest could use this issue to cause QEMU
to crash, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-8613)

Ling Liu discovered that QEMU incorrectly handled the Human Monitor
Interface. A local attacker could use this issue to cause QEMU to crash,
resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 15.10. (CVE-2015-8619, CVE-2016-1922)

David Alan Gilbert discovered that QEMU incorrectly handled the Q35 chipset
emulation when performing VM guest migrations. An attacker could use this
issue to cause QEMU to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-8666)

Ling Liu discovered that QEMU incorrectly handled the NE2000 device. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. (CVE-2015-8743)

It was discovered that QEMU incorrectly handled the vmxnet3 device. An
attacker inside the guest could use this issue to cause QEMU to crash,
resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 15.10. (CVE-2015-8744, CVE-2015-8745)

Qinghao Tang discovered that QEMU incorrect handled IDE AHCI emulation. An
attacker inside the guest could use this issue to cause a denial of
service, or possibly execute arbitrary code on the host as the user running
the QEMU process. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2016-1568)

Donghai ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'qemu, qemu-kvm' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.10.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-7549
80761
http://www.securityfocus.com/bid/80761
DSA-3471
http://www.debian.org/security/2016/dsa-3471
FEDORA-2016-e9bba2bb01
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
[oss-security] 20151214 CVE-2015-7549 Qemu: pci: msi-x: null pointer dereference issue
http://www.openwall.com/lists/oss-security/2015/12/14/2
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285
https://bugzilla.redhat.com/show_bug.cgi?id=1291137
Common Vulnerability Exposure (CVE) ID: CVE-2015-8504
78708
http://www.securityfocus.com/bid/78708
DSA-3469
http://www.debian.org/security/2016/dsa-3469
DSA-3470
http://www.debian.org/security/2016/dsa-3470
[oss-security] 20151208 Re: CVE request: Qemu: ui: vnc: avoid floating point exception
http://www.openwall.com/lists/oss-security/2015/12/08/7
http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8
https://bugzilla.redhat.com/show_bug.cgi?id=1289541
Common Vulnerability Exposure (CVE) ID: CVE-2015-8550
BugTraq ID: 79592
http://www.securityfocus.com/bid/79592
Debian Security Information: DSA-3434 (Google Search)
http://www.debian.org/security/2016/dsa-3434
Debian Security Information: DSA-3471 (Google Search)
Debian Security Information: DSA-3519 (Google Search)
http://www.debian.org/security/2016/dsa-3519
https://security.gentoo.org/glsa/201604-03
http://www.securitytracker.com/id/1034479
SuSE Security Announcement: SUSE-SU-2016:0911 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
SuSE Security Announcement: SUSE-SU-2016:1102 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
SuSE Security Announcement: SUSE-SU-2016:1764 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8558
80694
http://www.securityfocus.com/bid/80694
[oss-security] 20151214 CVE request Qemu: usb: infinite loop in ehci_advance_state results in DoS
http://www.openwall.com/lists/oss-security/2015/12/14/9
[oss-security] 20151214 Re: CVE request Qemu: usb: infinite loop in ehci_advance_state results in DoS
http://www.openwall.com/lists/oss-security/2015/12/14/16
[qemu-devel] 20151214 [PATCH] ehci: make idt processing more robust
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254
https://bugzilla.redhat.com/show_bug.cgi?id=1277983
Common Vulnerability Exposure (CVE) ID: CVE-2015-8567
79721
http://www.securityfocus.com/bid/79721
FEDORA-2016-275e9ff483
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
FEDORA-2016-2c15b72b01
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
FEDORA-2016-42778e8c82
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
FEDORA-2016-e1784417af
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
SUSE-SU-2016:0873
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
SUSE-SU-2016:0955
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
SUSE-SU-2016:1318
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
SUSE-SU-2016:1560
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
SUSE-SU-2016:1703
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
USN-2891-1
http://www.ubuntu.com/usn/USN-2891-1
[oss-security] 20151215 Re: CVE request Qemu: net: vmxnet3: host memory leakage
http://www.openwall.com/lists/oss-security/2015/12/15/10
[qemu-devel] 20151215 Re: [Qemu-devel] net: vmxnet3: memory leakage issue
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
openSUSE-SU-2016:0123
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
openSUSE-SU-2016:0126
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
openSUSE-SU-2016:1750
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8568
https://bugzilla.redhat.com/show_bug.cgi?id=1289816
Common Vulnerability Exposure (CVE) ID: CVE-2015-8613
79719
http://www.securityfocus.com/bid/79719
GLSA-201604-01
https://security.gentoo.org/glsa/201604-01
[oss-security] 20151221 Re: CVE request: Qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info
http://www.openwall.com/lists/oss-security/2015/12/22/1
[qemu-devel] 20151221 [Qemu-devel] [PATCH] scsi: initialise info object with appropriate size
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html
https://bugzilla.redhat.com/show_bug.cgi?id=1284008
Common Vulnerability Exposure (CVE) ID: CVE-2015-8619
79668
http://www.securityfocus.com/bid/79668
[oss-security] 20151223 CVE request Qemu: hmp: stack based OOB write in hmp_sendkey routine
http://www.openwall.com/lists/oss-security/2015/12/23/1
[qemu-devel] 20151217 [Qemu-devel] [PATCH] hmp: avoid redundant null termination of buffer
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-8666
79670
http://www.securityfocus.com/bid/79670
[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
[oss-security] 20151224 CVE request Qemu: acpi: heap based buffer overrun during VM migration
http://www.openwall.com/lists/oss-security/2015/12/24/1
http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb
https://bugzilla.redhat.com/show_bug.cgi?id=1283722
Common Vulnerability Exposure (CVE) ID: CVE-2015-8743
1034574
http://www.securitytracker.com/id/1034574
79820
http://www.securityfocus.com/bid/79820
[oss-security] 20160104 CVE request Qemu: net: ne2000: OOB r/w in ioport operations
http://www.openwall.com/lists/oss-security/2016/01/04/1
[oss-security] 20160104 Re: CVE request Qemu: net: ne2000: OOB r/w in ioport operations
http://www.openwall.com/lists/oss-security/2016/01/04/2
[qemu-devel] 20160104 Re: [PATCH v3] net: ne2000: fix bounds check in ioport operations
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html
https://bugzilla.redhat.com/show_bug.cgi?id=1264929
Common Vulnerability Exposure (CVE) ID: CVE-2015-8744
1034576
http://www.securitytracker.com/id/1034576
79821
http://www.securityfocus.com/bid/79821
[oss-security] 20160104 CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/3
[oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/6
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
https://bugzilla.redhat.com/show_bug.cgi?id=1270871
Common Vulnerability Exposure (CVE) ID: CVE-2015-8745
1034575
http://www.securitytracker.com/id/1034575
79822
http://www.securityfocus.com/bid/79822
[oss-security] 20160104 CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/4
[oss-security] 20160104 Re: CVE request Qemu: net: vmxnet3: reading IMR registers leads to a crash
http://www.openwall.com/lists/oss-security/2016/01/04/7
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895
https://bugzilla.redhat.com/show_bug.cgi?id=1270876
Common Vulnerability Exposure (CVE) ID: CVE-2016-1568
1034859
http://www.securitytracker.com/id/1034859
80191
http://www.securityfocus.com/bid/80191
RHSA-2016:0084
http://rhn.redhat.com/errata/RHSA-2016-0084.html
RHSA-2016:0086
http://rhn.redhat.com/errata/RHSA-2016-0086.html
RHSA-2016:0087
http://rhn.redhat.com/errata/RHSA-2016-0087.html
RHSA-2016:0088
http://rhn.redhat.com/errata/RHSA-2016-0088.html
[oss-security] 20160109 Qemu: ide: ahci use-after-free vulnerability in aio port commands
http://www.openwall.com/lists/oss-security/2016/01/09/1
[oss-security] 20160109 Re: Qemu: ide: ahci use-after-free vulnerability in aio port commands
http://www.openwall.com/lists/oss-security/2016/01/09/2
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab
Common Vulnerability Exposure (CVE) ID: CVE-2016-1714
1034858
http://www.securitytracker.com/id/1034858
80250
http://www.securityfocus.com/bid/80250
RHSA-2016:0081
http://rhn.redhat.com/errata/RHSA-2016-0081.html
RHSA-2016:0082
http://rhn.redhat.com/errata/RHSA-2016-0082.html
RHSA-2016:0083
http://rhn.redhat.com/errata/RHSA-2016-0083.html
RHSA-2016:0085
http://rhn.redhat.com/errata/RHSA-2016-0085.html
[Qemu-devel] 20160106 [PATCH v2 for v2.3.0] fw_cfg: add check to validate current entry value
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html
[oss-security] 20160111 CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/11/7
[oss-security] 20160112 Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/12/10
[oss-security] 20160112 Re: Re: CVE request Qemu: nvram: OOB r/w access in processing firmware configurations
http://www.openwall.com/lists/oss-security/2016/01/12/11
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-1922
81058
http://www.securityfocus.com/bid/81058
[oss-security] 20160116 CVE request Qemu: i386: null pointer dereference in vapic_write
http://www.openwall.com/lists/oss-security/2016/01/16/1
[oss-security] 20160116 Re: CVE request Qemu: i386: null pointer dereference in vapic_write
http://www.openwall.com/lists/oss-security/2016/01/16/6
[qemu-devel] 20160115 [PULL] i386: avoid null pointer dereference
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html
https://bugzilla.redhat.com/show_bug.cgi?id=1283934
Common Vulnerability Exposure (CVE) ID: CVE-2016-1981
81549
http://www.securityfocus.com/bid/81549
RHSA-2016:2585
http://rhn.redhat.com/errata/RHSA-2016-2585.html
[oss-security] 20160119 CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines
http://www.openwall.com/lists/oss-security/2016/01/19/10
[oss-security] 20160122 Re: CVE request Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines
http://www.openwall.com/lists/oss-security/2016/01/22/1
[qemu-devel] 20160119 [PATCH] e1000: eliminate infinite loops on out-of-bounds transfer start
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html
https://bugzilla.redhat.com/show_bug.cgi?id=1298570
Common Vulnerability Exposure (CVE) ID: CVE-2016-2197
82235
http://www.securityfocus.com/bid/82235
[qemu-devel] 20160128 [PATCH v2] ide: ahci: add check before calling dma_memory_unmap
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05742.html
[qemu-devel] 20160129 CVE request Qemu: ide: ahci null pointer dereference when using FIS CLB engines
http://www.openwall.com/lists/oss-security/2016/01/29/2
[qemu-devel] 20160130 Re: CVE request Qemu: ide: ahci null pointer dereference when using FIS CLB engines
http://www.openwall.com/lists/oss-security/2016/01/30/1
https://bugzilla.redhat.com/show_bug.cgi?id=1302057
Common Vulnerability Exposure (CVE) ID: CVE-2016-2198
[oss-security] 20160129 CVE request Qemu: usb: ehci null pointer dereference in ehci_caps_write
http://www.openwall.com/lists/oss-security/2016/01/29/6
[oss-security] 20160130 Re: CVE request Qemu: usb: ehci null pointer dereference in ehci_caps_write
http://www.openwall.com/lists/oss-security/2016/01/30/2
[qemu-devel] 20160129 [PATCH] usb: ehci: add capability mmio write function
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg05899.html
https://bugzilla.redhat.com/show_bug.cgi?id=1301643
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.