[ubuntu/noble-security] qemu 1:8.2.2+ds-0ubuntu1.13 (Accepted)
Fabian Toepfer
fabian.toepfer at canonical.com
Wed Mar 4 16:42:39 UTC 2026
qemu (1:8.2.2+ds-0ubuntu1.13) noble-security; urgency=medium
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2024-8354-2.patch: don't assert for SETUP to non-0
endpoint in hw/usb/hcd-uhci.
- CVE-2024-8354
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2025-11234-1.patch: release active GSource in TLS
channel finalizer in io/channel-tls.c.
- debian/patches/CVE-2025-11234-2.patch: move websock resource release to
close method in io/channel-websock.c.
- debian/patches/CVE-2025-11234-3.patch: fix use after free in websocket
handshake code in io/channel-websock.c.
- CVE-2025-11234
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-12464.patch: pad packets to minimum length in
qemu_receive_packet() in net/net.c.
- CVE-2025-12464
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2025-14876-1.patch: verify asym request size in
hw/virtio/virtio-crypto.c.
- debian/patches/CVE-2025-14876-2.patch: Limit the maximum size in
backends/cryptodev-builtin.c.
- CVE-2025-14876
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2026-0665.patch: fix PIRQ bounds check in
xen_physdev_map_pirq() in hw/i386/kvm/xen_evtchn.c.
- CVE-2026-0665
qemu (1:8.2.2+ds-0ubuntu1.12) noble; urgency=medium
* Do not expose arch-caps when not available on AMD
CPUs (LP: #2131822)
- d/p/u/lp2131822/* : create -v2 ubuntu machine types and backport arch_caps
for this newly created types.
- d/qemu-system-x86.NEWS : info about the new types
qemu (1:8.2.2+ds-0ubuntu1.11) noble; urgency=medium
* smbios: Fix buffer overrun when using path= option (LP: #2127974)
* debian/.gitignore: unignore patches
Date: 2026-03-03 19:54:10.172778+00:00
Changed-By: Fabian Toepfer <fabian.toepfer at canonical.com>
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.13
-------------- next part --------------
Sorry, changesfile not available.
More information about the noble-changes
mailing list