Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.5

QEMU KVM Xen Guest Support Has a Security Flaw

CVE-2026-0665
Summary

A bug in QEMU's Xen support for virtual machines can cause a guest operating system to intentionally make QEMU's memory access incorrectly, potentially leading to a crash or data corruption. This issue affects QEMU, a popular virtualization software, and requires prompt attention from IT teams to prevent potential disruptions. To mitigate this risk, update QEMU to the latest version available.

Original title
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercal...
Original description
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
nvd CVSS3.1 6.5
Vulnerability type
CWE-787 Out-of-bounds Write
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026