Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: qemu_test

Found 37 matching suggestions

View:
Compact
Detailed
Dismissed
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    11 packages
    • ubootQemuX86
    • ubootQemuX86_64
    • ubootQemuAarch64
    • qemu-python-utils
    • armTrustedFirmwareQemu
    • python312Packages.qemu
    • python313Packages.qemu
    • python314Packages.qemu
    • python312Packages.qemu-qmp
    • python313Packages.qemu-qmp
    • python314Packages.qemu-qmp
  • @LeSuisse removed package canokey-qemu
  • @LeSuisse dismissed
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU …

Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.

References

Affected products

QEMU
  • ==before 2.4.0

Matching in nixpkgs

Ignored packages (12)

Package maintainers

Old issue, current stable was never impacted
Untriaged
updated 1 month, 1 week ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    12 packages
    • canokey-qemu
    • ubootQemuX86
    • ubootQemuX86_64
    • ubootQemuAarch64
    • qemu-python-utils
    • armTrustedFirmwareQemu
    • python312Packages.qemu
    • python313Packages.qemu
    • python314Packages.qemu
    • python312Packages.qemu-qmp
    • python313Packages.qemu-qmp
    • python314Packages.qemu-qmp
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does …

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.

References

Affected products

QEMU
  • ==before 2.4.0.1

Matching in nixpkgs

Ignored packages (12)

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu before 1.6.2 block diver for the various disk image …

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

References

Affected products

Qemu
  • ==before 1.6.2

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows …

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.

References

Affected products

QEMU
  • ==before 1.7.2

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which …

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

References

Affected products

qemu
  • ==1.1.2+dfsg to 2.1+dfsg

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu before 2.0 block driver for Hyper-V VHDX Images is …

Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.

References

Affected products

Qemu
  • ==before 2.0

Matching in nixpkgs

Package maintainers

Untriaged
Permalink CVE-2025-14876
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Qemu-kvm: unbounded allocation in virtio-crypto

A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.

References

Affected products

qemu
  • =<10.2.0
rhcos
qemu-kvm
qemu-kvm-ma
virt:rhel/qemu-kvm

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
An user able to alter the savevm data (either on …

An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

Affected products

qemu
  • ==qemu-kvm 1.5.3

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
Integer overflow in the VNC display driver in QEMU before …

Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.

References

Affected products

QEMU
  • ==before 2.1.0

Matching in nixpkgs

Package maintainers

Untriaged
Permalink CVE-2026-0665
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Qemu-kvm: heap off-by-one in kvm xen physdevop_map_pirq

An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.

References

Affected products

qemu
  • =<10.2.0
rhcos
qemu-kvm
qemu-kvm-ma
virt:rhel/qemu-kvm

Matching in nixpkgs

Package maintainers