Debian Package Tracker
Register | Log in
Subscribe

qemu

fast processor emulator, dummy package

Choose email to subscribe with

general
  • source: qemu (main)
  • version: 1:5.2+dfsg-6
  • maintainer: Debian QEMU Team (archive) (DMD)
  • uploaders: Riku Voipio [DMD] – Michael Tokarev [DMD]
  • arch: all any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:2.1+dfsg-12+deb8u6
  • o-o-sec: 1:2.1+dfsg-12+deb8u15
  • oldstable: 1:2.8+dfsg-6+deb9u9
  • old-sec: 1:2.8+dfsg-6+deb9u13
  • stable: 1:3.1+dfsg-8+deb10u8
  • stable-sec: 1:3.1+dfsg-8+deb10u8
  • stable-bpo: 1:5.2+dfsg-3~bpo10+1
  • testing: 1:5.2+dfsg-6
  • unstable: 1:5.2+dfsg-6
versioned links
  • 1:2.1+dfsg-12+deb8u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:2.1+dfsg-12+deb8u15: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:2.8+dfsg-6+deb9u9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:2.8+dfsg-6+deb9u13: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.1+dfsg-8+deb10u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-3~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • qemu (42 bugs: 0, 18, 24, 0)
  • qemu-block-extra
  • qemu-guest-agent (1 bugs: 0, 1, 0, 0)
  • qemu-system (8 bugs: 0, 2, 6, 0)
  • qemu-system-arm (5 bugs: 0, 2, 3, 0)
  • qemu-system-common (5 bugs: 0, 0, 5, 0)
  • qemu-system-data
  • qemu-system-gui (3 bugs: 0, 2, 1, 0)
  • qemu-system-mips
  • qemu-system-misc
  • qemu-system-ppc (2 bugs: 0, 2, 0, 0)
  • qemu-system-sparc
  • qemu-system-x86 (22 bugs: 0, 19, 3, 0)
  • qemu-user (3 bugs: 0, 3, 0, 0)
  • qemu-user-binfmt (1 bugs: 0, 1, 0, 0)
  • qemu-user-static (21 bugs: 0, 19, 2, 0)
  • qemu-utils (2 bugs: 0, 1, 1, 0)
action needed
21 security issues in stretch high

There are 21 open security issues in stretch.

6 important issues:
  • CVE-2021-20203: An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
  • CVE-2021-20255:
  • CVE-2021-20257:
  • CVE-2021-3392:
  • CVE-2021-3409:
  • CVE-2021-3416:
11 issues left for the package maintainer to handle:
  • CVE-2019-12067: (postponed; to be fixed through a stable update)
  • CVE-2020-14394: (postponed; to be fixed through a stable update)
  • CVE-2020-17380: (postponed; to be fixed through a stable update) A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update)
  • CVE-2020-35504: (postponed; to be fixed through a stable update)
  • CVE-2020-35505: (postponed; to be fixed through a stable update)
  • CVE-2020-35506: (postponed; to be fixed through a stable update)
  • CVE-2021-20196: (postponed; to be fixed through a stable update)

You can find information about how to handle these issues in the security team's documentation.

4 ignored issues:
  • CVE-2018-15746: qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
  • CVE-2018-18438: Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
  • CVE-2018-19665: The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
  • CVE-2019-8934: hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Created: 2021-02-19 Last update: 2021-02-27 04:30
19 security issues in sid high

There are 19 open security issues in sid.

19 important issues:
  • CVE-2019-12067:
  • CVE-2020-14394:
  • CVE-2020-15469: In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
  • CVE-2020-17380: A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-29443: ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
  • CVE-2020-35503:
  • CVE-2020-35504:
  • CVE-2020-35505:
  • CVE-2020-35506:
  • CVE-2021-20196:
  • CVE-2021-20203: An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
  • CVE-2021-20255:
  • CVE-2021-20257:
  • CVE-2021-3392:
  • CVE-2021-3409:
  • CVE-2021-3416:
Created: 2021-02-19 Last update: 2021-02-27 04:30
35 security issues in buster high

There are 35 open security issues in buster.

9 important issues:
  • CVE-2020-27821: A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
  • CVE-2021-20181:
  • CVE-2021-20203: An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
  • CVE-2021-20221:
  • CVE-2021-20255:
  • CVE-2021-20257:
  • CVE-2021-3392:
  • CVE-2021-3409:
  • CVE-2021-3416:
25 issues left for the package maintainer to handle:
  • CVE-2019-12067: (postponed; to be fixed through a stable update)
  • CVE-2020-13253: (postponed; to be fixed through a stable update) sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
  • CVE-2020-14394: (postponed; to be fixed through a stable update)
  • CVE-2020-15469: (postponed; to be fixed through a stable update) In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
  • CVE-2020-15859: (postponed; to be fixed through a stable update) QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
  • CVE-2020-17380: (postponed; to be fixed through a stable update) A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
  • CVE-2020-25084: (postponed; to be fixed through a stable update) QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
  • CVE-2020-25085: (postponed; to be fixed through a stable update) QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
  • CVE-2020-25624: (postponed; to be fixed through a stable update) hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
  • CVE-2020-25625: (postponed; to be fixed through a stable update) hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
  • CVE-2020-25723: (postponed; to be fixed through a stable update) A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-27617: (postponed; to be fixed through a stable update) eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
  • CVE-2020-27661: (postponed; to be fixed through a stable update)
  • CVE-2020-28916: (postponed; to be fixed through a stable update) hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
  • CVE-2020-29129: (postponed; to be fixed through a stable update) ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
  • CVE-2020-29130: (postponed; to be fixed through a stable update) slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
  • CVE-2020-29443: (postponed; to be fixed through a stable update) ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
  • CVE-2020-35503: (postponed; to be fixed through a stable update)
  • CVE-2020-35504: (postponed; to be fixed through a stable update)
  • CVE-2020-35505: (postponed; to be fixed through a stable update)
  • CVE-2020-35506: (postponed; to be fixed through a stable update)
  • CVE-2021-20196: (postponed; to be fixed through a stable update)

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2019-8934: hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
Created: 2021-02-19 Last update: 2021-02-27 04:30
19 security issues in bullseye high

There are 19 open security issues in bullseye.

14 important issues:
  • CVE-2019-12067:
  • CVE-2020-15469: In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
  • CVE-2020-17380: A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-29443: ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
  • CVE-2021-20196:
  • CVE-2021-20203: An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
  • CVE-2021-20255:
  • CVE-2021-20257:
  • CVE-2021-3392:
  • CVE-2021-3409:
  • CVE-2021-3416:
5 issues left for the package maintainer to handle:
  • CVE-2020-14394: (postponed; to be fixed through a stable update)
  • CVE-2020-35503: (postponed; to be fixed through a stable update)
  • CVE-2020-35504: (postponed; to be fixed through a stable update)
  • CVE-2020-35505: (postponed; to be fixed through a stable update)
  • CVE-2020-35506: (postponed; to be fixed through a stable update)

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-02-27 04:30
3 bugs tagged patch in the BTS normal
The BTS contains patches fixing 3 bugs, consider including or untagging them.
Created: 2020-10-19 Last update: 2021-03-01 09:32
Depends on packages which need a new maintainer normal
The packages that qemu depends on which need a new maintainer are:
  • usbredir (#911431)
    • Build-Depends: libusbredirparser-dev
    • Depends: libusbredirparser1 libusbredirparser1 libusbredirparser1 libusbredirparser1 libusbredirparser1 libusbredirparser1
Created: 2019-11-22 Last update: 2021-03-01 08:34
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2021-02-21 Last update: 2021-03-01 07:01
Multiarch hinter reports 2 issue(s) low
There are issues with the multiarch metadata for this package.
  • qemu could be converted to Architecture: all and marked Multi-Arch: foreign
  • qemu-system could be converted to Architecture: all and marked Multi-Arch: foreign
Created: 2021-02-17 Last update: 2021-03-01 10:00
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2020-09-03 Last update: 2020-12-09 14:35
news
[rss feed]
  • [2021-02-21] qemu 1:5.2+dfsg-6 MIGRATED to testing (Debian testing watch)
  • [2021-02-18] Accepted qemu 1:2.8+dfsg-6+deb9u13 (source) into oldstable (Sylvain Beucler) (signed by: Holger Levsen)
  • [2021-02-16] Accepted qemu 1:5.2+dfsg-6 (source) into unstable (Michael Tokarev)
  • [2021-02-14] Accepted qemu 1:5.2+dfsg-5 (source) into unstable (Michael Tokarev)
  • [2021-02-14] Accepted qemu 1:5.2+dfsg-4 (source) into unstable (Michael Tokarev)
  • [2021-01-10] Accepted qemu 1:5.2+dfsg-3~bpo10+1 (source) into buster-backports (Michael Tokarev)
  • [2021-01-06] qemu 1:5.2+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2020-12-29] Accepted qemu 1:5.2+dfsg-3 (source) into unstable (Michael Tokarev)
  • [2020-12-10] Accepted qemu 1:5.2+dfsg-2 (source) into unstable (Michael Tokarev)
  • [2020-12-09] Accepted qemu 1:5.2+dfsg-1 (source) into unstable (Michael Tokarev)
  • [2020-11-29] Accepted qemu 1:2.8+dfsg-6+deb9u12 (source amd64) into oldstable (Thorsten Alteholz)
  • [2020-09-17] Accepted qemu 1:3.1+dfsg-8+deb10u8 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-09-13] Accepted qemu 1:2.8+dfsg-6+deb9u11 (source amd64) into oldstable (Abhijith PA)
  • [2020-09-06] Accepted qemu 1:3.1+dfsg-8+deb10u8 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-09-05] qemu 1:5.1+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2020-09-02] Accepted qemu 1:5.1+dfsg-4 (source) into unstable (Michael Tokarev)
  • [2020-08-24] qemu 1:5.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2020-08-17] Accepted qemu 1:5.1+dfsg-3 (source) into unstable (Michael Tokarev)
  • [2020-08-17] Accepted qemu 1:5.1+dfsg-2 (source) into unstable (Michael Tokarev)
  • [2020-08-17] Accepted qemu 1:5.1+dfsg-1 (source) into unstable (Michael Tokarev)
  • [2020-08-13] Accepted qemu 1:5.0-14~bpo10+1 (source amd64 all) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-08-12] Accepted qemu 1:5.1+dfsg-0exp1 (source) into experimental (Michael Tokarev)
  • [2020-08-12] qemu 1:5.0-14 MIGRATED to testing (Debian testing watch)
  • [2020-07-31] Accepted qemu 1:5.0-14 (source) into unstable (Michael Tokarev)
  • [2020-07-26] qemu 1:5.0-13 MIGRATED to testing (Debian testing watch)
  • [2020-07-25] Accepted qemu 1:2.8+dfsg-6+deb9u10 (source) into oldstable (Michael Tokarev)
  • [2020-07-25] Accepted qemu 1:3.1+dfsg-8+deb10u7 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-07-24] Accepted qemu 1:3.1+dfsg-8+deb10u7 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-07-23] Accepted qemu 1:3.1+dfsg-8+deb10u6 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2020-07-22] Accepted qemu 1:5.0-13 (source) into unstable (Michael Tokarev)
  • 1
  • 2
bugs [bug history graph]
  • all: 149 161
  • RC: 0
  • I&N: 82 85
  • M&W: 67 76
  • F&P: 0
  • patch: 3
links
  • homepage
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 87)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:5.2+dfsg-3ubuntu1
  • 84 bugs (3 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing