Debian Package Tracker
Register | Log in
Subscribe

qemu

Choose email to subscribe with

general
  • source: qemu (main)
  • version: 1:8.1.3+ds-1
  • maintainer: Debian QEMU Team (archive) (DMD)
  • uploaders: Michael Tokarev [DMD]
  • arch: all any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:3.1+dfsg-8+deb10u8
  • o-o-sec: 1:3.1+dfsg-8+deb10u11
  • o-o-bpo: 1:5.2+dfsg-9~bpo10+1
  • oldstable: 1:5.2+dfsg-11+deb11u3
  • old-sec: 1:5.2+dfsg-11+deb11u2
  • old-bpo: 1:7.2+dfsg-7+deb12u2~bpo11+1
  • stable: 1:7.2+dfsg-7+deb12u2
  • stable-bpo: 1:8.1.2+ds-1~bpo12+1
  • stable-p-u: 1:7.2+dfsg-7+deb12u3
  • testing: 1:8.1.2+ds-1
  • unstable: 1:8.1.3+ds-1
  • exp: 1:8.2.0~rc2+ds-1
versioned links
  • 1:3.1+dfsg-8+deb10u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:3.1+dfsg-8+deb10u11: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-9~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-11+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-11+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7+deb12u2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.0.4+dfsg-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.1.2+ds-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.1.2+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.1.3+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:8.2.0~rc2+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • qemu-block-extra
  • qemu-guest-agent (1 bugs: 0, 1, 0, 0)
  • qemu-system (8 bugs: 0, 3, 5, 0)
  • qemu-system-arm (5 bugs: 0, 2, 3, 0)
  • qemu-system-common (6 bugs: 0, 0, 6, 0)
  • qemu-system-data (1 bugs: 0, 0, 1, 0)
  • qemu-system-gui (3 bugs: 0, 3, 0, 0)
  • qemu-system-mips
  • qemu-system-misc (1 bugs: 0, 1, 0, 0)
  • qemu-system-modules-opengl
  • qemu-system-modules-spice
  • qemu-system-ppc (2 bugs: 0, 2, 0, 0)
  • qemu-system-sparc
  • qemu-system-x86 (23 bugs: 0, 18, 5, 0)
  • qemu-system-xen
  • qemu-user (1 bugs: 0, 1, 0, 0)
  • qemu-user-binfmt
  • qemu-user-static (19 bugs: 0, 17, 2, 0)
  • qemu-utils (2 bugs: 0, 1, 1, 0)
action needed
A new upstream version is available: 8.2.0~rc2 high
A new upstream version 8.2.0~rc2 is available, you should consider packaging it.
Created: 2023-11-18 Last update: 2023-12-06 04:04
10 security issues in trixie high

There are 10 open security issues in trixie.

10 important issues:
  • CVE-2021-3735: A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2023-3019: A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2019-12067: The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2022-36648: The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.
Created: 2023-06-11 Last update: 2023-12-03 18:35
10 security issues in sid high

There are 10 open security issues in sid.

10 important issues:
  • CVE-2021-3735: A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2023-3019: A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2019-12067: The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2022-36648: The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.
Created: 2022-07-04 Last update: 2023-12-03 18:35
Failed to analyze the VCS repository. Please troubleshoot and fix the issue. high
vcswatch reports that there is an error with this package's VCS, or the debian/changelog file inside it. Please check the error shown below and try to fix it. You might have to update the VCS URL in the debian/control file to point to the correct repository.

/usr/bin/du: cannot access './objects/05': No such file or directory /usr/bin/du: cannot access './objects/0f': No such file or directory /usr/bin/du: cannot access './objects/09': No such file or directory /usr/bin/du: cannot access './objects/15': No such file or directory /usr/bin/du: cannot access './objects/12': No such file or directory /usr/bin/du: cannot access './objects/11': No such file or directory /usr/bin/du: cannot access './objects/03': No such file or directory /usr/bin/du: cannot access './objects/28': No such file or directory /usr/bin/du: cannot access './objects/0b': No such file or directory /usr/bin/du: cannot access './objects/1c': No such file or directory /usr/bin/du: cannot access './objects/04': No such file or directory /usr/bin/du: cannot access './objects/0d': No such file or directory /usr/bin/du: cannot access './objects/41': No such file or directory /usr/bin/du: cannot access './objects/47': No such file or directory /usr/bin/du: cannot access './objects/0c': No such file or directory /usr/bin/du: cannot access './objects/16': No such file or directory /usr/bin/du: cannot access './objects/24': No such file or directory /usr/bin/du: cannot access './objects/2c': No such file or directory /usr/bin/du: cannot access './objects/57': No such file or directory /usr/bin/du: cannot access './objects/5d': No such file or directory /usr/bin/du: cannot access './objects/44': No such file or directory /usr/bin/du: cannot access './objects/20': No such file or directory /usr/bin/du: cannot access './objects/40': No such file or directory /usr/bin/du: cannot access './objects/32': No such file or directory /usr/bin/du: cannot access './objects/54': No such file or directory /usr/bin/du: cannot access './objects/31': No such file or directory /usr/bin/du: cannot access './objects/6d/95d5917544a13b24b8efcde0571dbe3f075ce4': No such file or directory /usr/bin/du: cannot access './objects/6d/a311a60d58dba27f5f790217d5ebba944e34ab': No such file or directory /usr/bin/du: cannot access './objects/6d/ae30aee73c625babf0da518393d23fd073152f': No such file or directory /usr/bin/du: cannot access './objects/6d/b77bb2c1aa1e59b4a04ba3c9b4b8bb17609d48': No such file or directory /usr/bin/du: cannot access './objects/6d/d06214892d71cbbdd25daed7693e58afcb1093': No such file or directory /usr/bin/du: cannot access './objects/6d/d0d8bbec8f523b479d663374d7e7ccde236445': No such file or directory /usr/bin/du: cannot access './objects/6d/eb8fdf31667baa4cc4eb2b1b00d99f4e571add': No such file or directory /usr/bin/du: cannot access './objects/6d/085d6a932840918299bf433ac725568908743f': No such file or directory /usr/bin/du: cannot access './objects/6d/0d261dbfa6122e9b3bdcab7d934ca49f069c21': No such file or directory /usr/bin/du: cannot access './objects/6d/b23ca323047a09d89493530033f015caf47fcb': No such file or directory /usr/bin/du: cannot access './objects/6d/7144604fb36149d3ddd69c52e33a01076ea8c2': No such file or directory /usr/bin/du: cannot access './objects/6d/e5c9808efcc598bbac70d61e21e65c3d688efb': No such file or directory /usr/bin/du: cannot access './objects/6d/f6b7329d25179f27b3f28b4c6ff1536d487d51': No such file or directory /usr/bin/du: cannot access './objects/6d/b21a48878fae0bf459e128eff303f49f9d6d6b': No such file or directory /usr/bin/du: cannot access './objects/27': No such file or directory /usr/bin/du: cannot access './objects/43': No such file or directory /usr/bin/du: cannot access './objects/33': No such file or directory /usr/bin/du: cannot access './objects/46': No such file or directory /usr/bin/du: cannot access './objects/55': No such file or directory /usr/bin/du: cannot access './objects/26': No such file or directory /usr/bin/du: cannot access './objects/06': No such file or directory /usr/bin/du: cannot access './objects/07': No such file or directory /usr/bin/du: cannot access './objects/08': No such file or directory /usr/bin/du: cannot access './objects/0a': No such file or directory /usr/bin/du: cannot access './objects/0e': No such file or directory /usr/bin/du: cannot access './objects/10': No such file or directory /usr/bin/du: cannot access './objects/14': No such file or directory /usr/bin/du: cannot access './objects/17': No such file or directory /usr/bin/du: cannot access './objects/18': No such file or directory /usr/bin/du: cannot access './objects/19': No such file or directory /usr/bin/du: cannot access './objects/1a': No such file or directory /usr/bin/du: cannot access './objects/1b': No such file or directory /usr/bin/du: cannot access './objects/1d': No such file or directory /usr/bin/du: cannot access './objects/1e': No such file or directory /usr/bin/du: cannot access './objects/1f': No such file or directory /usr/bin/du: cannot access './objects/21': No such file or directory /usr/bin/du: cannot access './objects/22': No such file or directory /usr/bin/du: cannot access './objects/23': No such file or directory /usr/bin/du: cannot access './objects/25': No such file or directory /usr/bin/du: cannot access './objects/2b': No such file or directory /usr/bin/du: cannot access './objects/2d': No such file or directory /usr/bin/du: cannot access './objects/2f': No such file or directory /usr/bin/du: cannot access './objects/34': No such file or directory /usr/bin/du: cannot access './objects/35': No such file or directory /usr/bin/du: cannot access './objects/36': No such file or directory /usr/bin/du: cannot access './objects/37': No such file or directory /usr/bin/du: cannot access './objects/38': No such file or directory /usr/bin/du: cannot access './objects/3a': No such file or directory /usr/bin/du: cannot access './objects/3c': No such file or directory /usr/bin/du: cannot access './objects/3d': No such file or directory /usr/bin/du: cannot access './objects/3e': No such file or directory /usr/bin/du: cannot access './objects/3f': No such file or directory /usr/bin/du: cannot access './objects/42': No such file or directory /usr/bin/du: cannot access './objects/52': No such file or directory /usr/bin/du: cannot access './objects/53': No such file or directory /usr/bin/du: cannot access './objects/56': No such file or directory /usr/bin/du: cannot access './objects/5a': No such file or directory /usr/bin/du: cannot access './objects/5b': No such file or directory /usr/bin/du: cannot access './objects/5e': No such file or directory /usr/bin/du: cannot access './objects/5f': No such file or directory /usr/bin/du: cannot access './objects/61': No such file or directory /usr/bin/du: cannot access './objects/62': No such file or directory /usr/bin/du: cannot access './objects/63': No such file or directory /usr/bin/du: cannot access './objects/64': No such file or directory /usr/bin/du: cannot access './objects/66': No such file or directory /usr/bin/du: cannot access './objects/68': No such file or directory /usr/bin/du: cannot access './objects/69': No such file or directory /usr/bin/du: cannot access './objects/6c': No such file or directory /usr/bin/du: cannot access './objects/6f': No such file or directory /usr/bin/du: cannot access './objects/70': No such file or directory /usr/bin/du: cannot access './objects/72': No such file or directory /usr/bin/du: cannot access './objects/73': No such file or directory /usr/bin/du: cannot access './objects/74': No such file or directory /usr/bin/du: cannot access './objects/75': No such file or directory /usr/bin/du: cannot access './objects/76/fec1e313b09b358f9b70d863ef76061974003b': No such file or directory /usr/bin/du: cannot access './objects/76/ff1dfcb6f3ac3513daa72877a29e9b86f9a4d3': No such file or directory /usr/bin/du: cannot access './objects/df/a91ed5254e75efd5813eb258db859011fa40ae': No such file or directory /usr/bin/du: cannot access './objects/df/dc4c410e848be82615b6bda70bf4534b6941b4': No such file or directory
Created: 2023-10-22 Last update: 2023-12-03 13:33
debian/patches: 2 patches with invalid metadata, 19 patches to forward upstream high

Among the 27 debian patches available in version 1:8.1.3+ds-1 of the package, we noticed the following issues:

  • 2 patches with invalid metadata that ought to be fixed.
  • 19 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-11-23 08:32
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2023-11-28 Last update: 2023-12-06 06:39
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2023-09-13 Last update: 2023-12-06 06:34
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-10-27 Last update: 2023-12-06 04:08
lintian reports 12 warnings normal
Lintian reports 12 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-11-23 Last update: 2023-11-23 06:41
23 low-priority security issues in bullseye low

There are 23 open security issues in bullseye.

14 issues left for the package maintainer to handle:
  • CVE-2021-3735: (postponed; to be fixed through a stable update) A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-1050: (needs triaging) A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to execute HW commands when shared buffers are not yet allocated, potentially leading to a use-after-free condition.
  • CVE-2022-3872: (postponed; to be fixed through a stable update) An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: (postponed; to be fixed through a stable update) A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2023-3019: (postponed; to be fixed through a stable update) A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2023-5088: (needs triaging) A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
  • CVE-2019-12067: (postponed; to be fixed through a stable update) The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20255: (postponed; to be fixed through a stable update) A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2022-36648: (postponed; to be fixed through a stable update) The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.
  • CVE-2023-42467: (needs triaging) QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.

You can find information about how to handle these issues in the security team's documentation.

9 ignored issues:
  • CVE-2021-3611: A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
  • CVE-2021-3750: A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
  • CVE-2021-3929: A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.
  • CVE-2022-4144: An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
  • CVE-2023-2861:
  • CVE-2020-15469: In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
  • CVE-2020-35504: A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2020-35505: A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2020-35506: A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
Created: 2022-07-04 Last update: 2023-12-03 18:35
14 low-priority security issues in bookworm low

There are 14 open security issues in bookworm.

14 issues left for the package maintainer to handle:
  • CVE-2021-3735: (postponed; to be fixed through a stable update) A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: (postponed; to be fixed through a stable update) An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: (postponed; to be fixed through a stable update) A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2023-1544: (needs triaging) A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
  • CVE-2023-3019: (postponed; to be fixed through a stable update) A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
  • CVE-2023-3301: (needs triaging) A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
  • CVE-2023-5088: (needs triaging) A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
  • CVE-2019-12067: (postponed; to be fixed through a stable update) The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20255: (postponed; to be fixed through a stable update) A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2022-36648: (postponed; to be fixed through a stable update) The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.

You can find information about how to handle these issues in the security team's documentation.

1 issue that should be fixed with the next stable update:
  • CVE-2023-42467: QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
Created: 2023-06-10 Last update: 2023-12-03 18:35
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2023-10-02 Last update: 2023-10-02 04:18
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2023-11-23 01:36
testing migrations
  • This package will soon be part of the auto-capstone transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status: Blocked. Can't migrate due to a non-migratable dependency. Check status below.
    • Blocked by: zlib
    • Migration status for qemu (1:8.1.2+ds-1 to 1:8.1.3+ds-1): BLOCKED: Cannot migrate due to another item, which is blocked (please check which dependencies are stuck)
    • Issues preventing migration:
    • ∙ ∙ Built-Using: qemu zlib (not considered)
    • ∙ ∙ Invalidated by built-using
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/q/qemu.html
    • ∙ ∙ autopkgtest for libvirt/9.9.0-1: ppc64el: Pass
    • ∙ ∙ autopkgtest for qemu/1:8.1.3+ds-1: amd64: No test results ♻ (reference ♻), arm64: No test results ♻ (reference ♻), armel: No test results ♻ (reference ♻), armhf: No test results ♻ (reference ♻), i386: No test results ♻ (reference ♻), ppc64el: No test results ♻ , s390x: No test results ♻ (reference ♻)
    • ∙ ∙ Ignoring non-reproducibility on amd64 (not a regression) - info ♻
    • ∙ ∙ 13 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2023-12-03] Accepted qemu 1:7.2+dfsg-7+deb12u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-11-30] Accepted qemu 1:8.2.0~rc2+ds-1 (source) into experimental (Michael Tokarev)
  • [2023-11-23] Accepted qemu 1:8.2.0~rc1+ds-1 (source) into experimental (Michael Tokarev)
  • [2023-11-22] Accepted qemu 1:8.1.3+ds-1 (source) into unstable (Michael Tokarev)
  • [2023-11-15] Accepted qemu 1:8.2.0~rc0+ds-1 (source) into experimental (Michael Tokarev)
  • [2023-11-01] Accepted qemu 1:7.2+dfsg-7+deb12u2~bpo11+1 (source) into bullseye-backports (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-10-23] Accepted qemu 1:8.1.2+ds-1~bpo12+1 (source) into stable-backports (Michael Tokarev)
  • [2023-10-22] qemu 1:8.1.2+ds-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-18] Accepted qemu 1:8.1.1+ds-2~bpo12+1 (all amd64 source) into stable-backports (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-10-17] Accepted qemu 1:8.1.2+ds-1 (source) into unstable (Michael Tokarev)
  • [2023-10-14] qemu 1:8.1.1+ds-2 MIGRATED to testing (Debian testing watch)
  • [2023-10-08] Accepted qemu 1:8.1.1+ds-2 (source) into unstable (Michael Tokarev)
  • [2023-10-08] qemu 1:8.1.1+ds-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-05] Accepted qemu 1:3.1+dfsg-8+deb10u11 (source) into oldoldstable (Sean Whitton)
  • [2023-10-01] Accepted qemu 1:8.1.1+ds-1 (source) into unstable (Michael Tokarev)
  • [2023-09-26] qemu 1:8.1.0+ds-6 MIGRATED to testing (Debian testing watch)
  • [2023-09-25] Accepted qemu 1:5.2+dfsg-11+deb11u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2023-09-25] Accepted qemu 1:7.2+dfsg-7+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-09-20] Accepted qemu 1:8.1.0+ds-6 (source) into unstable (Michael Tokarev)
  • [2023-09-17] Accepted qemu 1:8.1.0+ds-5 (source) into unstable (Michael Tokarev)
  • [2023-09-11] Accepted qemu 1:8.1.0+ds-4 (source) into unstable (Michael Tokarev)
  • [2023-09-09] Accepted qemu 1:8.1.0+ds-3 (source) into unstable (Michael Tokarev)
  • [2023-09-09] Accepted qemu 1:8.1.0+ds-2 (source) into unstable (Michael Tokarev)
  • [2023-09-09] Accepted qemu 1:8.1.0+ds-1 (source) into unstable (Michael Tokarev)
  • [2023-08-29] qemu 1:8.0.4+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2023-08-23] Accepted qemu 1:8.1.0+ds-1~exp2 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2023-08-23] Accepted qemu 1:8.1.0+ds-1~exp1 (source) into experimental (Michael Tokarev)
  • [2023-08-22] Accepted qemu 1:8.0.4+dfsg-3 (source) into unstable (Michael Tokarev)
  • [2023-08-21] Accepted qemu 1:8.0.4+dfsg-2 (source) into unstable (Michael Tokarev)
  • [2023-08-20] Accepted qemu 1:8.1.0~rc4+ds-4 (source) into experimental (Michael Tokarev)
  • 1
  • 2
bugs [bug history graph]
  • all: 145 155
  • RC: 0
  • I&N: 80 81
  • M&W: 64 73
  • F&P: 1
  • patch: 2
links
  • homepage
  • lintian (0, 12)
  • buildd: logs, exp, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 93)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:8.0.4+dfsg-1ubuntu5
  • 93 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing