Home / mailings [USN-7744-1] QEMU vulnerabilities
Posted on 11 September 2025
Ubuntu Security==========================================================================Ubuntu Security Notice USN-7744-1
September 11, 2025
qemu vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description:
- qemu: Machine emulator and virtualizer
Details:
It was discovered that QEMU incorrectly handled certain virtio devices. A
privileged guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3446)
It was discovered that QEMU incorrectly handled SDHCI device emulation. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-3447)
It was discovered that QEMU incorrectly handled calculating the checksum
of a short-sized fragmented packet. A guest attacker could possibly use
this issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 24.04 LTS. (CVE-2024-3567)
It was discovered that the QEMU qemu-img utility incorrectly handled
certain crafted image files. An attacker could use this issue to cause QEMU
to consume resources, leading to a denial of service, or possibly read and
write to an existing external file. This issue only affected Ubuntu 22.04
LTS and Ubuntu 24.04 LTS. (CVE-2024-4467)
It was discovered that QEMU incorrectly handled the RSS feature on
virtio-net devices. A privileged guest attacker could possibly use this
issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-6505)
It was discovered that QEMU incorrectly handled the NBD server. An attacker
could use this issue to cause QEMU to consume resources, leading to a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-7409)
It was discovered that QEMU incorrectly handled certain USB devices. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-8354)
It was discovered that the QEMU package incorrectly set up a binfmt_misc
registration with the C (Credential) flag. A local attacker could use this
with a suid/sgid binary to escalate privileges. This update will no longer
run foreign-architecture binaries with suid/sgid with elevated privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
qemu-system 1:9.2.1+ds-1ubuntu5.2
qemu-system-arm 1:9.2.1+ds-1ubuntu5.2
qemu-system-mips 1:9.2.1+ds-1ubuntu5.2
qemu-system-misc 1:9.2.1+ds-1ubuntu5.2
qemu-system-ppc 1:9.2.1+ds-1ubuntu5.2
qemu-system-riscv 1:9.2.1+ds-1ubuntu5.2
qemu-system-s390x 1:9.2.1+ds-1ubuntu5.2
qemu-system-sparc 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86-xen 1:9.2.1+ds-1ubuntu5.2
qemu-system-xen 1:9.2.1+ds-1ubuntu5.2
Ubuntu 24.04 LTS
qemu-system 1:8.2.2+ds-0ubuntu1.10
qemu-system-arm 1:8.2.2+ds-0ubuntu1.10
qemu-system-mips 1:8.2.2+ds-0ubuntu1.10
qemu-system-misc 1:8.2.2+ds-0ubuntu1.10
qemu-system-ppc 1:8.2.2+ds-0ubuntu1.10
qemu-system-s390x 1:8.2.2+ds-0ubuntu1.10
qemu-system-sparc 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86-xen 1:8.2.2+ds-0ubuntu1.10
qemu-system-xen 1:8.2.2+ds-0ubuntu1.10
Ubuntu 22.04 LTS
qemu-system 1:6.2+dfsg-2ubuntu6.27
qemu-system-arm 1:6.2+dfsg-2ubuntu6.27
qemu-system-mips 1:6.2+dfsg-2ubuntu6.27
qemu-system-misc 1:6.2+dfsg-2ubuntu6.27
qemu-system-ppc 1:6.2+dfsg-2ubuntu6.27
qemu-system-s390x 1:6.2+dfsg-2ubuntu6.27
qemu-system-sparc 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-microvm 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-xen 1:6.2+dfsg-2ubuntu6.27
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7744-1
CVE-2024-3446, CVE-2024-3447, CVE-2024-3567, CVE-2024-4467,
CVE-2024-6505, CVE-2024-7409, CVE-2024-8354, https://bugs.launchpad.net/bugs/2120814
Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:9.2.1+ds-1ubuntu5.2
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.10
https://launchpad.net/ubuntu/+source/qemu/1:6.2+dfsg-2ubuntu6.27
--===============9153759073513868688==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature