Package "qemu"
| Name: |
qemu
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- supplemental block backend modules for qemu-system and qemu-utils
- Guest-side qemu-system agent
- QEMU full system emulation binaries (x86)
- QEMU full system emulation (Xen helper package)
|
| Latest version: |
1:10.1.0+ds-5ubuntu2.4 |
| Release: |
questing (25.10) |
| Level: |
security |
| Repository: |
universe |
Links
Other versions of "qemu" in Questing
Packages in group
Deleted packages are displayed in grey.
Changelog
|
qemu (1:10.1.0+ds-5ubuntu2.4) questing-security; urgency=medium
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2024-8354.patch: don't assert for SETUP to non-0
endpoint in hw/usb/hcd-uhci.
- CVE-2024-8354
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2025-11234-1.patch: release active GSource in TLS
channel finalizer in io/channel-tls.c.
- debian/patches/CVE-2025-11234-2.patch: move websock resource release to
close method in io/channel-websock.c.
- debian/patches/CVE-2025-11234-3.patch: fix use after free in websocket
handshake code in io/channel-websock.c.
- CVE-2025-11234
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-12464.patch: pad packets to minimum length in
qemu_receive_packet() in net/net.c.
- CVE-2025-12464
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2025-14876-1.patch: verify asym request size in
hw/virtio/virtio-crypto.c.
- debian/patches/CVE-2025-14876-2.patch: Limit the maximum size in
backends/cryptodev-builtin.c.
- CVE-2025-14876
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2026-0665.patch: fix PIRQ bounds check in
xen_physdev_map_pirq() in hw/i386/kvm/xen_evtchn.c.
- CVE-2026-0665
-- Fabian Toepfer <email address hidden> Tue, 03 Mar 2026 15:17:44 +0100
|
| CVE-2024-8354 |
A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a U |
| CVE-2025-11234 |
A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to |
| CVE-2025-12464 |
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devic |
| CVE-2025-14876 |
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, lea |
| CVE-2026-0665 |
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QE |
|
About
-
Send Feedback to @ubuntu_updates