Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: qemu_xen

Found 42 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-23554
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 5 days, 16 hours ago
Use after free of paging structures in EPT

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to memory ranges not owned by the guest, thus allowing access to unintended memory regions.

Affected products

Xen
  • ==consult Xen advisory XSA-480

Matching in nixpkgs

pkgs.xenomapper

Utility for post processing mapped reads that have been aligned to a primary genome and a secondary genome and binning reads into species specific, multimapping in each species, unmapped and unassigned bins

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

Package maintainers

Untriaged
Permalink CVE-2026-23555
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 5 days, 16 hours ago
Xenstored DoS by unprivileged domain

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get.

Affected products

Xen
  • ==consult Xen advisory XSA-481

Matching in nixpkgs

pkgs.xenomapper

Utility for post processing mapped reads that have been aligned to a primary genome and a secondary genome and binning reads into species specific, multimapping in each species, unmapped and unassigned bins

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

Package maintainers

Dismissed
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    11 packages
    • ubootQemuX86
    • ubootQemuX86_64
    • ubootQemuAarch64
    • qemu-python-utils
    • armTrustedFirmwareQemu
    • python312Packages.qemu
    • python313Packages.qemu
    • python314Packages.qemu
    • python312Packages.qemu-qmp
    • python313Packages.qemu-qmp
    • python314Packages.qemu-qmp
  • @LeSuisse removed package canokey-qemu
  • @LeSuisse dismissed
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU …

Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.

References

Affected products

QEMU
  • ==before 2.4.0

Matching in nixpkgs

Ignored packages (12)

Package maintainers

Old issue, current stable was never impacted
Dismissed
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    14 packages
    • qemu_test
    • qemu-utils
    • canokey-qemu
    • ubootQemuX86
    • ubootQemuX86_64
    • ubootQemuAarch64
    • qemu-python-utils
    • armTrustedFirmwareQemu
    • python312Packages.qemu
    • python313Packages.qemu
    • python314Packages.qemu
    • python312Packages.qemu-qmp
    • python313Packages.qemu-qmp
    • python314Packages.qemu-qmp
  • @LeSuisse dismissed
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows …

The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

References

Affected products

QEMU
  • ==before 2.4.0.1

Matching in nixpkgs

Ignored packages (14)

Package maintainers

Old issue, current stable was never impacted
Untriaged
updated 1 month, 1 week ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    12 packages
    • canokey-qemu
    • ubootQemuX86
    • ubootQemuX86_64
    • ubootQemuAarch64
    • qemu-python-utils
    • armTrustedFirmwareQemu
    • python312Packages.qemu
    • python313Packages.qemu
    • python314Packages.qemu
    • python312Packages.qemu-qmp
    • python313Packages.qemu-qmp
    • python314Packages.qemu-qmp
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does …

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.

References

Affected products

QEMU
  • ==before 2.4.0.1

Matching in nixpkgs

Ignored packages (12)

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu before 1.6.2 block diver for the various disk image …

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

References

Affected products

Qemu
  • ==before 1.6.2

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows …

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.

References

Affected products

QEMU
  • ==before 1.7.2

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which …

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

References

Affected products

qemu
  • ==1.1.2+dfsg to 2.1+dfsg

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 1 week ago
Qemu before 2.0 block driver for Hyper-V VHDX Images is …

Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.

References

Affected products

Qemu
  • ==before 2.0

Matching in nixpkgs

Package maintainers

Untriaged
Permalink CVE-2025-14876
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Qemu-kvm: unbounded allocation in virtio-crypto

A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.

References

Affected products

qemu
  • =<10.2.0
rhcos
qemu-kvm
qemu-kvm-ma
virt:rhel/qemu-kvm

Matching in nixpkgs

Package maintainers