Package "qemu-system-modules-spice"
| Name: |
qemu-system-modules-spice
|
Description: |
QEMU full system emulation binaries (spice display modules)
|
| Latest version: |
1:8.2.2+ds-0ubuntu1.16 |
| Release: |
noble (24.04) |
| Level: |
updates |
| Repository: |
main |
| Head package: |
qemu |
| Homepage: |
http://www.qemu.org/ |
Links
Download "qemu-system-modules-spice"
Other versions of "qemu-system-modules-spice" in Noble
Changelog
|
qemu (1:8.2.2+ds-0ubuntu1.16) noble-security; urgency=medium
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2024-6519.patch: keep a reference to the device while
SCRIPTS in hw/scsi/lsi53c895a.c.
- CVE-2024-6519
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2026-2243.patch: fix OOB read in vmdk_read_extent()
in block/vmdk.c.
- CVE-2026-2243
* SECURITY UPDATE: heap buffer overflow
- debian/patches/CVE-2026-3195-1.patch: fix max_size bounds check in input
cb in hw/audio/virtio-snd.c.
- debian/patches/CVE-2026-3195-2.patch: tighten read amount in in_cb in
hw/audio/virtio-snd.c.
- CVE-2026-3195
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2026-3196.patch: handle 5.14.6.2 for PCM_INFO properly
in hw/audio/virtio-snd.c.
- CVE-2026-3196
* SECURITY UPDATE: out-of-bounds write
- debian/patches/CVE-2026-3842.patch: check length returned by
cpu_physical_memory_map() in hw/hyperv/syndbg.c.
- CVE-2026-3842
-- Fabian Toepfer <email address hidden> Wed, 08 Apr 2026 11:57:03 +0200
|
| Source diff to previous version |
| CVE-2024-6519 |
A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape. |
| CVE-2026-2243 |
A flaw was found in QEMU. A specially crafted VMDK image could trigger an out-of-bounds read vulnerability, potentially leading to a 12-byte leak of |
|
|
qemu (1:8.2.2+ds-0ubuntu1.15) noble; urgency=medium
* d/p/u/lp2142099-*: fix wrong feature dependency for waitpkg
(LP: #2142099)
-- Hector Cao <email address hidden> Fri, 20 Mar 2026 11:41:09 +0100
|
| Source diff to previous version |
| 2142099 |
migration jammy to noble fails due to missing feature : waitpkg |
|
|
qemu (1:8.2.2+ds-0ubuntu1.14) noble; urgency=medium
* Fix crash on concurrent `block-stream` and `query-named-block-nodes`
(LP: #2126951)
- d/p/ubuntu/lp2126951-block-Drop-detach_subchain-for-bdrv_replace_node.patch
-- Wesley Hershberger <email address hidden> Wed, 11 Mar 2026 10:42:17 -0500
|
| Source diff to previous version |
| 2126951 |
`block-stream` segfault with concurrent `query-named-block-nodes` |
|
|
qemu (1:8.2.2+ds-0ubuntu1.13) noble-security; urgency=medium
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2024-8354-2.patch: don't assert for SETUP to non-0
endpoint in hw/usb/hcd-uhci.
- CVE-2024-8354
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2025-11234-1.patch: release active GSource in TLS
channel finalizer in io/channel-tls.c.
- debian/patches/CVE-2025-11234-2.patch: move websock resource release to
close method in io/channel-websock.c.
- debian/patches/CVE-2025-11234-3.patch: fix use after free in websocket
handshake code in io/channel-websock.c.
- CVE-2025-11234
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-12464.patch: pad packets to minimum length in
qemu_receive_packet() in net/net.c.
- CVE-2025-12464
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2025-14876-1.patch: verify asym request size in
hw/virtio/virtio-crypto.c.
- debian/patches/CVE-2025-14876-2.patch: Limit the maximum size in
backends/cryptodev-builtin.c.
- CVE-2025-14876
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2026-0665.patch: fix PIRQ bounds check in
xen_physdev_map_pirq() in hw/i386/kvm/xen_evtchn.c.
- CVE-2026-0665
-- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:03:56 +0100
|
| Source diff to previous version |
| CVE-2024-8354 |
A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U |
| CVE-2025-11234 |
A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to |
| CVE-2025-12464 |
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devic |
| CVE-2025-14876 |
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, lea |
| CVE-2026-0665 |
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QE |
|
|
qemu (1:8.2.2+ds-0ubuntu1.12) noble; urgency=medium
* Do not expose arch-caps when not available on AMD
CPUs (LP: #2131822)
- d/p/u/lp2131822/* : create -v2 ubuntu machine types and backport arch_caps
for this newly created types.
- d/qemu-system-x86.NEWS : info about the new types
-- Hector Cao <email address hidden> Mon, 15 Dec 2025 12:33:49 +0000
|
| 2131822 |
Known Windows 11 KVM Issue\u00a0AMD KMODE Exception |
|
About
-
Send Feedback to @ubuntu_updates