Debian Package Tracker
Register | Log in
Subscribe

qemu

Choose email to subscribe with

general
  • source: qemu (main)
  • version: 1:7.2+dfsg-7
  • maintainer: Debian QEMU Team (archive) (DMD)
  • uploaders: Michael Tokarev [DMD]
  • arch: all any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1:3.1+dfsg-8+deb10u8
  • old-sec: 1:3.1+dfsg-8+deb10u10
  • old-bpo: 1:5.2+dfsg-9~bpo10+1
  • stable: 1:5.2+dfsg-11+deb11u2
  • stable-sec: 1:5.2+dfsg-11+deb11u2
  • stable-bpo: 1:7.2+dfsg-7~bpo11+1
  • testing: 1:7.2+dfsg-6
  • unstable: 1:7.2+dfsg-7
  • exp: 1:8.0+dfsg-4
versioned links
  • 1:3.1+dfsg-8+deb10u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.1+dfsg-8+deb10u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-9~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-11+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.0+dfsg-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • qemu-block-extra
  • qemu-guest-agent (2 bugs: 0, 2, 0, 0)
  • qemu-system (7 bugs: 0, 2, 5, 0)
  • qemu-system-arm (5 bugs: 0, 2, 3, 0)
  • qemu-system-common (7 bugs: 0, 1, 6, 0)
  • qemu-system-data
  • qemu-system-gui (3 bugs: 0, 3, 0, 0)
  • qemu-system-mips
  • qemu-system-misc (1 bugs: 0, 1, 0, 0)
  • qemu-system-ppc (1 bugs: 0, 1, 0, 0)
  • qemu-system-sparc
  • qemu-system-x86 (24 bugs: 0, 19, 5, 0)
  • qemu-system-xen
  • qemu-user (1 bugs: 0, 1, 0, 0)
  • qemu-user-binfmt
  • qemu-user-static (17 bugs: 0, 16, 1, 0)
  • qemu-utils (2 bugs: 0, 1, 1, 0)
action needed
A new upstream version is available: 8.0 high
A new upstream version 8.0 is available, you should consider packaging it.
Created: 2023-03-25 Last update: 2023-05-17 06:34
10 security issues in sid high

There are 10 open security issues in sid.

10 important issues:
  • CVE-2021-3735: A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-0330: A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
  • CVE-2023-1544: A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
  • CVE-2019-12067: The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20255: A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Created: 2022-07-04 Last update: 2023-05-14 17:34
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-03-26 Last update: 2023-05-17 08:01
lintian reports 17 warnings normal
Lintian reports 17 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-05-14 Last update: 2023-05-14 21:04
3 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit a947e6727c747a72666806a13b4f2c69c0182d6a
Author: Michael Tokarev <mjt@tls.msk.ru>
Date:   Fri Apr 28 07:25:56 2023 +0300

    d/qemu-system-common.NEWS: virtiofsd package is already available

commit 26b776cd8a077f3a1a95ebf613dbc3adb07912c1
Author: Michael Tokarev <mjt@tls.msk.ru>
Date:   Sun Apr 23 16:28:36 2023 +0300

    d/control: remove :any qualifier for the (commented-out) qemu-system-for-host package dep

commit e017f53a8550d0bcaaca81c6dacac8ec34295cf0
Author: Michael Tokarev <mjt@tls.msk.ru>
Date:   Sun Apr 23 15:42:37 2023 +0300

    +fix-relocated-path.patch
    
    Patch qemu to avoid trying various random relative paths
    to firmware files which depends on the actual path to the
    qemu-binary, - this makes no sense and is against the Debian
    policy.
Created: 2023-04-23 Last update: 2023-05-14 12:30
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • qemu-system could be converted to Architecture: all and marked Multi-Arch: foreign
Created: 2023-05-15 Last update: 2023-05-17 06:36
debian/patches: 19 patches to forward upstream low

Among the 21 debian patches available in version 1:7.2+dfsg-7 of the package, we noticed the following issues:

  • 19 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-05-15 00:37
26 low-priority security issues in bullseye low

There are 26 open security issues in bullseye.

25 issues left for the package maintainer to handle:
  • CVE-2021-3507: (needs triaging) A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
  • CVE-2021-3611: (needs triaging) A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
  • CVE-2021-3735: (needs triaging) A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2021-3750: (needs triaging) A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
  • CVE-2021-3929: (needs triaging) A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
  • CVE-2021-3930: (postponed; to be fixed through a stable update) An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
  • CVE-2022-0216: (needs triaging) A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2022-1050: (needs triaging) A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
  • CVE-2022-2962: (needs triaging) A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2022-3872: (needs triaging) An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2022-4144: (needs triaging) An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
  • CVE-2023-0330: (needs triaging) A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
  • CVE-2023-1544: (needs triaging) A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
  • CVE-2019-12067: (postponed; to be fixed through a stable update) The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-14394: (postponed; to be fixed through a stable update) An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2020-35504: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2020-35505: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2020-35506: (postponed; to be fixed through a stable update) A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
  • CVE-2021-20196: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20203: (postponed; to be fixed through a stable update) An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
  • CVE-2021-20255: (postponed; to be fixed through a stable update) A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2020-15469: In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
Created: 2022-07-04 Last update: 2023-05-14 17:34
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2022-12-27 Last update: 2022-12-27 13:14
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2023-05-14 19:47
testing migrations
  • excuses:
    • Migration status for qemu (1:7.2+dfsg-6 to 1:7.2+dfsg-7): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 3 of 7 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/q/qemu.html
    • ∙ ∙ autopkgtest for ganeti/3.0.2-3: amd64: Ignored failure, arm64: Pass, armel: Ignored failure, armhf: Ignored failure, i386: Pass, ppc64el: Pass, s390x: Ignored failure
    • ∙ ∙ autopkgtest for qemu/1:7.2+dfsg-7: amd64: No test results, arm64: No test results, armel: Failed (not a regression), armhf: No test results, i386: No test results, ppc64el: No test results, s390x: No test results
    • ∙ ∙ Overriding age needed from 7 days to 7 by sramacher
    • ∙ ∙ Ignoring block request by freeze, due to unblock request by sramacher
    • Not considered
news
[rss feed]
  • [2023-05-16] Accepted qemu 1:7.2+dfsg-7~bpo11+1 (source) into bullseye-backports (Michael Tokarev)
  • [2023-05-14] Accepted qemu 1:7.2+dfsg-7 (source) into unstable (Michael Tokarev)
  • [2023-05-07] qemu 1:7.2+dfsg-6 MIGRATED to testing (Debian testing watch)
  • [2023-04-29] Accepted qemu 1:7.2+dfsg-6 (source) into unstable (Michael Tokarev)
  • [2023-04-21] Accepted qemu 1:8.0+dfsg-4 (source) into experimental (Michael Tokarev)
  • [2023-04-20] Accepted qemu 1:8.0+dfsg-3 (source) into experimental (Michael Tokarev)
  • [2023-04-20] Accepted qemu 1:8.0+dfsg-2 (source) into experimental (Michael Tokarev)
  • [2023-04-20] Accepted qemu 1:8.0+dfsg-1 (source) into experimental (Michael Tokarev)
  • [2023-04-18] Accepted qemu 1:8.0~rc4+dfsg-2 (source) into experimental (Michael Tokarev)
  • [2023-04-14] Accepted qemu 1:8.0~rc4+dfsg-1 (source) into experimental (Michael Tokarev)
  • [2023-04-10] Accepted qemu 1:8.0~rc3+dfsg-2 (source) into experimental (Michael Tokarev)
  • [2023-04-06] Accepted qemu 1:8.0~rc3+dfsg-1 (source) into experimental (Michael Tokarev)
  • [2023-03-31] Accepted qemu 1:8.0~rc2+dfsg-1 (source) into experimental (Michael Tokarev)
  • [2023-03-26] qemu 1:7.2+dfsg-5 MIGRATED to testing (Debian testing watch)
  • [2023-03-14] Accepted qemu 1:3.1+dfsg-8+deb10u10 (source) into oldstable (Sylvain Beucler)
  • [2023-03-12] Accepted qemu 1:7.2+dfsg-5~bpo11+1 (source) into bullseye-backports (Michael Tokarev)
  • [2023-03-05] Accepted qemu 1:7.2+dfsg-5 (source) into unstable (Michael Tokarev)
  • [2023-03-03] qemu 1:7.2+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2023-02-20] Accepted qemu 1:7.2+dfsg-4 (source) into unstable (Michael Tokarev)
  • [2023-02-20] qemu 1:7.2+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2023-02-11] Accepted qemu 1:7.2+dfsg-3~bpo11+1 (source) into bullseye-backports (Michael Tokarev)
  • [2023-02-10] Accepted qemu 1:7.2+dfsg-3 (source) into unstable (Michael Tokarev)
  • [2023-02-09] qemu 1:7.2+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-04] Accepted qemu 1:7.2+dfsg-2~bpo11+1 (source) into bullseye-backports (Michael Tokarev)
  • [2023-02-02] Accepted qemu 1:7.2+dfsg-2 (source) into unstable (Michael Tokarev)
  • [2023-01-05] Accepted qemu 1:7.2+dfsg-1~bpo11+2 (source) into bullseye-backports (Michael Tokarev)
  • [2023-01-03] Accepted qemu 1:7.2+dfsg-1~bpo11+1 (source) into bullseye-backports (Michael Tokarev)
  • [2023-01-01] qemu 1:7.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-15] Accepted qemu 1:7.2+dfsg-1 (source) into unstable (Michael Tokarev)
  • [2022-10-03] Accepted qemu 1:7.1+dfsg-2~bpo11+3 (source) into bullseye-backports (Michael Tokarev)
  • 1
  • 2
bugs [bug history graph]
  • all: 146 156
  • RC: 1
  • I&N: 80 81
  • M&W: 64 73
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian (0, 17)
  • buildd: logs, exp, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 93)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:7.2+dfsg-5ubuntu2
  • 82 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing