Package "qemu"

Name: qemu


fast processor emulator

Latest version: 1:2.11+dfsg-1ubuntu7.5
Release: bionic (18.04)
Level: updates
Repository: universe
Homepage: http://www.qemu.org/


Save this URL for the latest version of "qemu": https://www.ubuntuupdates.org/qemu

Download "qemu"

Other versions of "qemu" in Bionic

Repository Area Version
base universe 1:2.11+dfsg-1ubuntu7
base main 1:2.11+dfsg-1ubuntu7
security main 1:2.11+dfsg-1ubuntu7.3
security universe 1:2.11+dfsg-1ubuntu7.3
updates main 1:2.11+dfsg-1ubuntu7.5

Packages in group

Deleted packages are displayed in grey.


Version: 1:2.11+dfsg-1ubuntu7.5 2018-09-06 10:06:39 UTC

  qemu (1:2.11+dfsg-1ubuntu7.5) bionic; urgency=medium

  [Christian Ehrhardt]
  * d/p/lp-1755912-qxl-fix-local-renderer-crash.patch: Fix an issue triggered
    by migrations with UI frontends or frequent guest resolution changes
    (LP: #1755912)

  [ Murilo Opsfelder Araujo ]
  * d/p/ubuntu/target-ppc-extend-eieio-for-POWER9.patch: Backport to
    extend eieio for POWER9 emulation (LP: #1787408).

 -- Christian Ehrhardt <email address hidden> Tue, 21 Aug 2018 11:25:45 +0200

Source diff to previous version
1755912 qemu-system-x86_64 crashed with SIGABRT when using option -vga qxl
1787408 qemu 1:2.11+dfsg-1ubuntu7.4 hangs when -cpu POWER9 is specified

Version: 1:2.11+dfsg-1ubuntu7.4 2018-06-21 09:06:52 UTC

  qemu (1:2.11+dfsg-1ubuntu7.4) bionic; urgency=medium

  * d/p/ubuntu/machine-type-hpb.patch: add -hpb machine type
    for host-phys-bits=true (LP: #1776189)
    - add an info about this change in debian/qemu-system-x86.NEWS

 -- Christian Ehrhardt <email address hidden> Wed, 13 Jun 2018 10:41:34 +0200

Source diff to previous version
1776189 implement a machine type based control of host-phys-bits

Version: 1:2.11+dfsg-1ubuntu7.3 2018-06-12 13:06:45 UTC

  qemu (1:2.11+dfsg-1ubuntu7.3) bionic-security; urgency=medium

  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/ubuntu/CVE-2018-3639-2.patch: define the AMD
      'virt-ssbd' CPUID feature bit in target/i386/cpu.c.
    - debian/patches/ubuntu/CVE-2018-3639-3.patch: define the Virt SSBD MSR
      and handling of it in target/i386/cpu.h, target/i386/kvm.c,
    - CVE-2018-3639

 -- Marc Deslauriers <email address hidden> Wed, 23 May 2018 07:57:07 -0400

Source diff to previous version
CVE-2018-3639 Speculative Store Bypass

Version: 1:2.11+dfsg-1ubuntu7.2 2018-05-22 01:06:56 UTC

  qemu (1:2.11+dfsg-1ubuntu7.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/ubuntu/CVE-2018-3639.patch: add bit(2) of SPEC_CTRL
      MSR support - Reduced Data Speculation to target/i386/cpu.*.
    - CVE-2018-3639

 -- Marc Deslauriers <email address hidden> Thu, 17 May 2018 09:57:26 -0400

Source diff to previous version
CVE-2018-3639 Speculative Store Bypass

Version: 1:2.11+dfsg-1ubuntu7.1 2018-05-16 17:07:32 UTC

  qemu (1:2.11+dfsg-1ubuntu7.1) bionic-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds access during migration via ps2
    - debian/patches/ubuntu/CVE-2017-16845.patch: check PS2Queue pointers
      in post_load routine in hw/input/ps2.c.
    - CVE-2017-16845
  * SECURITY UPDATE: arbitrary code execution via load_multiboot
    - debian/patches/ubuntu/CVE-2018-7550.patch: handle bss_end_addr being
      zero in hw/i386/multiboot.c.
    - CVE-2018-7550
  * SECURITY UPDATE: denial of service in Cirrus CLGD 54xx VGA
    - debian/patches/ubuntu/CVE-2018-7858.patch: fix region calculation in
    - CVE-2018-7858

 -- Marc Deslauriers <email address hidden> Fri, 11 May 2018 13:26:42 -0400

CVE-2017-16845 hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
CVE-2018-7550 The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU hos
CVE-2018-7858 Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of ser

About   -   Send Feedback to @ubuntu_updates