Package "qemu"

Name: qemu


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • extra block backend modules for qemu-system and qemu-utils
  • QEMU full system emulation binaries
  • QEMU full system emulation binaries (arm)
  • QEMU full system emulation binaries (common files)

Latest version: 1:6.2+dfsg-2ubuntu6.13
Release: jammy (22.04)
Level: updates
Repository: main


Other versions of "qemu" in Jammy

Repository Area Version
base main 1:6.2+dfsg-2ubuntu6
base universe 1:6.2+dfsg-2ubuntu6
security main 1:6.2+dfsg-2ubuntu6.11
security universe 1:6.2+dfsg-2ubuntu6.11
updates universe 1:6.2+dfsg-2ubuntu6.13
proposed main 1:6.2+dfsg-2ubuntu6.14
proposed universe 1:6.2+dfsg-2ubuntu6.14

Packages in group

Deleted packages are displayed in grey.


Version: 1:6.2+dfsg-2ubuntu6.13 2023-08-31 21:07:00 UTC

  qemu (1:6.2+dfsg-2ubuntu6.13) jammy; urgency=medium

  * d/p/u/lp-1853307-*.patch: Backport patches to implement Enhanced
    Interpretation for PCI Functions (s390x). (LP: #1853307)

 -- Sergio Durigan Junior <email address hidden> Wed, 05 Jul 2023 10:47:05 -0400

Source diff to previous version
1853307 [22.04 FEAT] Enhanced Interpretation for PCI Functions - qemu part

Version: 1:6.2+dfsg-2ubuntu6.12 2023-07-13 20:07:02 UTC

  qemu (1:6.2+dfsg-2ubuntu6.12) jammy; urgency=medium

  [ Chengen Du ]
  * d/p/u/lp2025591-block-use-the-request-length-for-iov-alignment.patch:
    Fix boot error on the HWE 6.2 kernel with direct IO (eg, cache=none)
    if the logical block size is smaller than in the host (LP: #2025591)

 -- Mauricio Faria de Oliveira <email address hidden> Mon, 03 Jul 2023 18:00:25 -0300

Source diff to previous version
2025591 Boot error on Jammy on the 6.2 HWE kernel (Lunar) with direct IO if virtual block size \u003c host block size

Version: 1:6.2+dfsg-2ubuntu6.11 2023-06-19 06:07:08 UTC

  qemu (1:6.2+dfsg-2ubuntu6.11) jammy-security; urgency=medium

  * SECURITY UPDATE: user-after-free issue
    - debian/patches/CVE-2022-1050.patch: Protect against buggy or
      malicious guest driver
    - CVE-2022-1050
  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2022-4144-*.patch: Have qxl_log_command Return
      early if no log_cmd handler; Document qxl_phys2virt(); Pass requested
      buffer size to qxl_phys2virt(); Avoid buffer overrun in qxl_phys2virt;
      Assert memory slot fits in preallocated MemoryRegion
    - CVE-2022-4144
  * SECURITY UPDATE: reentrancy problem
    - debian/patches/CVE-2023-0330.patch: Fix reentrancy issues in the LSI
    - CVE-2023-0330

 -- Nishit Majithia <email address hidden> Tue, 13 Jun 2023 17:03:25 +0530

Source diff to previous version
CVE-2022-1050 A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when
CVE-2022-4144 An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structu
CVE-2023-0330 A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like st

Version: 1:6.2+dfsg-2ubuntu6.10 2023-06-15 22:07:07 UTC

  qemu (1:6.2+dfsg-2ubuntu6.10) jammy; urgency=medium

  * d/p/u/allow-repeating-hot-unplug-requests.patch: Allow repeating
    hot-unplug requests by making ACPI PCI able to requeue them.
    (LP: #2018733)

 -- Sergio Durigan Junior <email address hidden> Fri, 26 May 2023 17:40:31 -0400

Source diff to previous version
2018733 allow repeating hot-unplug requests

Version: 1:6.2+dfsg-2ubuntu6.9 2023-06-05 11:07:02 UTC

  qemu (1:6.2+dfsg-2ubuntu6.9) jammy; urgency=medium

  * d/p/u/lp-2019766-target-arm-kvm-Retry-KVM_CREATE_VM-call-if-it-fails-.patch:
    ARM: Retry KVM_CREATE_VM when it returns EINTR (LP: #2019766)

 -- dann frazier <email address hidden> Tue, 16 May 2023 14:59:54 -0600

2019766 Arm KVM guests fail to start if KVM_CREATE_VM returns EINTR

About   -   Send Feedback to @ubuntu_updates