Home / mailingsPDF  

[USN-7744-1] QEMU vulnerabilities

Posted on 11 September 2025
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-7744-1
September 11, 2025

qemu vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

It was discovered that QEMU incorrectly handled certain virtio devices. A
privileged guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3446)

It was discovered that QEMU incorrectly handled SDHCI device emulation. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-3447)

It was discovered that QEMU incorrectly handled calculating the checksum
of a short-sized fragmented packet. A guest attacker could possibly use
this issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 24.04 LTS. (CVE-2024-3567)

It was discovered that the QEMU qemu-img utility incorrectly handled
certain crafted image files. An attacker could use this issue to cause QEMU
to consume resources, leading to a denial of service, or possibly read and
write to an existing external file. This issue only affected Ubuntu 22.04
LTS and Ubuntu 24.04 LTS. (CVE-2024-4467)

It was discovered that QEMU incorrectly handled the RSS feature on
virtio-net devices. A privileged guest attacker could possibly use this
issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-6505)

It was discovered that QEMU incorrectly handled the NBD server. An attacker
could use this issue to cause QEMU to consume resources, leading to a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-7409)

It was discovered that QEMU incorrectly handled certain USB devices. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-8354)

It was discovered that the QEMU package incorrectly set up a binfmt_misc
registration with the C (Credential) flag. A local attacker could use this
with a suid/sgid binary to escalate privileges. This update will no longer
run foreign-architecture binaries with suid/sgid with elevated privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
qemu-system 1:9.2.1+ds-1ubuntu5.2
qemu-system-arm 1:9.2.1+ds-1ubuntu5.2
qemu-system-mips 1:9.2.1+ds-1ubuntu5.2
qemu-system-misc 1:9.2.1+ds-1ubuntu5.2
qemu-system-ppc 1:9.2.1+ds-1ubuntu5.2
qemu-system-riscv 1:9.2.1+ds-1ubuntu5.2
qemu-system-s390x 1:9.2.1+ds-1ubuntu5.2
qemu-system-sparc 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86-xen 1:9.2.1+ds-1ubuntu5.2
qemu-system-xen 1:9.2.1+ds-1ubuntu5.2

Ubuntu 24.04 LTS
qemu-system 1:8.2.2+ds-0ubuntu1.10
qemu-system-arm 1:8.2.2+ds-0ubuntu1.10
qemu-system-mips 1:8.2.2+ds-0ubuntu1.10
qemu-system-misc 1:8.2.2+ds-0ubuntu1.10
qemu-system-ppc 1:8.2.2+ds-0ubuntu1.10
qemu-system-s390x 1:8.2.2+ds-0ubuntu1.10
qemu-system-sparc 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86-xen 1:8.2.2+ds-0ubuntu1.10
qemu-system-xen 1:8.2.2+ds-0ubuntu1.10

Ubuntu 22.04 LTS
qemu-system 1:6.2+dfsg-2ubuntu6.27
qemu-system-arm 1:6.2+dfsg-2ubuntu6.27
qemu-system-mips 1:6.2+dfsg-2ubuntu6.27
qemu-system-misc 1:6.2+dfsg-2ubuntu6.27
qemu-system-ppc 1:6.2+dfsg-2ubuntu6.27
qemu-system-s390x 1:6.2+dfsg-2ubuntu6.27
qemu-system-sparc 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-microvm 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-xen 1:6.2+dfsg-2ubuntu6.27

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7744-1
CVE-2024-3446, CVE-2024-3447, CVE-2024-3567, CVE-2024-4467,
CVE-2024-6505, CVE-2024-7409, CVE-2024-8354, https://bugs.launchpad.net/bugs/2120814

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:9.2.1+ds-1ubuntu5.2
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.10
https://launchpad.net/ubuntu/+source/qemu/1:6.2+dfsg-2ubuntu6.27

--===============9153759073513868688==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP