Package "qemu"

Name: qemu


fast processor emulator

Latest version: 1:2.11+dfsg-1ubuntu7.10
Release: bionic (18.04)
Level: updates
Repository: universe
Homepage: http://www.qemu.org/


Save this URL for the latest version of "qemu": https://www.ubuntuupdates.org/qemu

Download "qemu"

Other versions of "qemu" in Bionic

Repository Area Version
base universe 1:2.11+dfsg-1ubuntu7
base main 1:2.11+dfsg-1ubuntu7
security universe 1:2.11+dfsg-1ubuntu7.8
security main 1:2.11+dfsg-1ubuntu7.8
updates main 1:2.11+dfsg-1ubuntu7.10

Packages in group

Deleted packages are displayed in grey.


Version: 1:2.11+dfsg-1ubuntu7.10 2019-03-04 19:07:15 UTC

  qemu (1:2.11+dfsg-1ubuntu7.10) bionic; urgency=medium

  * d/p/ubuntu/lp-1806104-spapr_pci-Remove-unhelpful-pagesize-warning.patch:
    remove misleading page size warning on qemu-system-ppc64 (LP: #1806104)
  * d/p/ubuntu/lp-1812384-s390x-Return-specification-exception.patch: ensure
    a proper exception on unknown diag 308 subcodes
    (LP: #1812384)
  * d/p/ubuntu/lp-1809083-*: fix backward migration on ppc64el (LP: #1809083)

 -- Christian Ehrhardt <email address hidden> Thu, 31 Jan 2019 14:07:51 +0100

Source diff to previous version
1806104 [Ubuntu-18.04][LTC-Test] Warning: \
1812384 [Ubuntu] qemu - backport diag308 stable exception fix
1809083 [Ubuntu 18.04] Backward migration of Ubuntu 16.04.4 P8 guest from Ubuntu 18.04 P9 Host -\u003e Ubuntu 16.04.4 P8 host is broken

Version: 1:2.11+dfsg-1ubuntu7.9 2018-12-13 10:07:05 UTC

  qemu (1:2.11+dfsg-1ubuntu7.9) bionic; urgency=medium

  * debian/patches/ubuntu/lp1787405-*: Support guest dedicated Crypto
    Adapters on s390x (LP: #1787405)

 -- Christian Ehrhardt <email address hidden> Thu, 15 Nov 2018 12:29:56 +0100

Source diff to previous version
1787405 [FEAT] Guest-dedicated Crypto Adapters

Version: 1:2.11+dfsg-1ubuntu7.8 2018-11-26 16:06:35 UTC

  qemu (1:2.11+dfsg-1ubuntu7.8) bionic-security; urgency=medium

  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
    - debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
    - CVE-2018-16847
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
    - debian/patches/CVE-2018-18954.patch: check size before data buffer
      access in hw/ppc/pnv_lpc.c.
    - CVE-2018-18954
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
    - CVE-2018-19364

 -- Marc Deslauriers <email address hidden> Wed, 21 Nov 2018 14:17:51 -0500

Source diff to previous version
CVE-2018-10839 Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. I
CVE-2018-11806 m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
CVE-2018-12617 qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causin
CVE-2018-16847 An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device
CVE-2018-17958 Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
CVE-2018-17962 Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
CVE-2018-17963 qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possib
CVE-2018-18849 lsi53c895a: OOB msg buffer access leads to DoS
CVE-2018-18954 The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.
CVE-2018-19364 Use-after-free due to race condition while updating fid path

Version: 1:2.11+dfsg-1ubuntu7.7 2018-10-29 10:06:15 UTC

  qemu (1:2.11+dfsg-1ubuntu7.7) bionic; urgency=medium

  * Update pxe netboot images for KVM s390x to qemu 3.0 level (LP: #1790901)
    The SLOF source pieces in src:qemu are only used for s390x netboot,
    which are independent ROMs (no linking). All other binaries out of this
    are part of src:slof and independent.
    - d/p/ubuntu/lp-1790901-partial-SLOF-for-s390x-netboot-2.11-to-3.0.patch
    - d/p/ubuntu/lp-1790901-0*: backport s390x pxelinux netboot capabilities
      and related fixes

 -- Christian Ehrhardt <email address hidden> Tue, 25 Sep 2018 13:31:15 +0200

Source diff to previous version
1790901 How to use s390x pxelinux style network booting from qemu 3.0 in bionic

Version: 1:2.11+dfsg-1ubuntu7.6 2018-10-08 15:07:14 UTC

  qemu (1:2.11+dfsg-1ubuntu7.6) bionic; urgency=medium

  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch

  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

 -- Christian Ehrhardt <email address hidden> Wed, 29 Aug 2018 11:46:37 +0200

1780773 [18.10 FEAT] zKVM: CPU Model z14 ZR 1
1789551 qemu: CVE-2018-15746: seccomp: blacklist is not applied to all threads
1790457 kernel: improve spectre mitigation
1787267 Can't type | ( pipe ) over vnc
CVE-2018-15746 qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy fo

About   -   Send Feedback to @ubuntu_updates