Source: qemu
Version: 1:10.2.1+ds-1
Severity: important
Tags: security upstream
Forwarded: 
https://lore.kernel.org/qemu-devel/caj9qjssswxkmevethg57-ph6maefbutsav-r07ma9_x1sp6...@mail.gmail.com/
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for qemu.

CVE-2026-2243[0]:
| A flaw was found in QEMU. A specially crafted VMDK image could
| trigger an out-of-bounds read vulnerability, potentially leading to
| a 12-byte leak of sensitive information or a denial of service
| condition (DoS).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-2243
    https://www.cve.org/CVERecord?id=CVE-2026-2243
[1] 
https://lore.kernel.org/qemu-devel/caj9qjssswxkmevethg57-ph6maefbutsav-r07ma9_x1sp6...@mail.gmail.com/
[2] https://bugzilla.redhat.com/show_bug.cgi?id=2440934

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to