Change logs for qemu source package in Bullseye

  • qemu (1:5.2+dfsg-11+deb11u3) bullseye; urgency=medium
    
      * CVE-2021-20196 (Closes: #984453)
      * CVE-2023-0330 (Closes: #1029155)
      * CVE-2023-1544 (Closes: #1034179)
      * CVE-2023-3354
      * CVE-2021-3930
      * CVE-2023-3180
      * CVE-2021-20203 (Closes: #984452)
      * CVE-2021-3507 (Closes: #987410)
      * CVE-2020-14394 (Closes: #979677)
      * CVE-2023-3301
      * CVE-2022-0216 (Closes: #1014590)
    
     -- Moritz Mühlenhoff <email address hidden>  Mon, 04 Sep 2023 16:11:35 +0200
  • qemu (1:5.2+dfsg-11+deb11u2) bullseye-security; urgency=medium
    
      * virtio-net-fix-map-leaking-on-error-during-receive-CVE-2022-26353.patch
        fix memory leak after fix for CVE-2021-3748
      * vhost-vsock-detach-the-virqueue-element-on-error-CVE-2022-26354.patch
        vhost-sock device was not detaching invalid element from
        the virtqueue on error
      * ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2021-4206.patch,
        display-qxl-render-fix-race-condition-in-qxl_cursor-CVE-2021-4207.patch
        two flaws can lead to allocation of small cursor object followed by a
        subsequent heap-based buffer overflow with a potential for executing
        arbitrary code within the context of QEMU process
      * virtiofsd-drop-membership-of-all-supplementary-group-CVE-2022-0358.patch
        potential group escalation allowed by virtiofsd
    
     -- Michael Tokarev <email address hidden>  Wed, 04 May 2022 22:50:01 +0300
  • qemu (1:5.2+dfsg-11+deb11u1) bullseye-security; urgency=medium
    
      [ Michael Tokarev ]
      * usbredir-fix-free-call-CVE-2021-3682.patch
        Closes: #991911, CVE-2021-3682: wrong free in usbredir in bufp_alloc()
      * uas-add-stream-number-sanity-checks-CVE-2021-3713.patch
        Closes: #992727, CVE-2021-3713: an OOB write to UASDevice fields
         in UAS device emulation code
      * virtio-net-fix-use-after-unmap-free-for-sg-CVE-2021-3748.patch
        Closes: #993401, CVE-2021-3748: use-after-free in virtio_net_receive_rcu
      * ati_2d-fix-buffer-overflow-in-ati_2d_blt-CVE-2021-3638.patch
        Closes: #992726, CVE-2021-3638:
         inconsistent check in ati_2d_blt() may lead to out-of-bounds write
      * vhost-user-gpu fixes from upstream, 7 patches:
         CVE-2021-3544: multiple memory leaks
         CVE-2021-3545: information disclosure due to uninitialized memory reads
         CVE-2021-3546: out-of-bounds write in virgl_cmd_get_capset()
         Closes: #989042, CVE-2021-3544, CVE-2021-3545, CVE-2021-3546
    
      [ Cyril Brulebois ]
      * linux-user-elfload-fix-address-calculation-in-fallback.patch
        This fixes problems with some access to an unmounted /proc, as seen
        while building images for the Raspberry Pi devices. With thanks to
        Diederik de Haas for the report and to Bernhard Übelacker for
        pinpointing the upstream fix to backport. (Closes: #988174)
    
     -- Michael Tokarev <email address hidden>  Wed, 29 Sep 2021 13:14:52 +0300
  • qemu (1:5.2+dfsg-11) unstable; urgency=medium
    
      * i386-acpi-restore-device-paths-for-pre-5.1-vms.patch
        This fixes a serious issue in some VMs (in particuar, Windows & MacOS)
        when migrating from buster qemu to bullseye qemu.
        (Closes: #990675)
      * pvrdma-fix-possible-mremap-overflow-in-pvrdma-device-CVE-2021-3582.patch
        (Closes: #990565, CVE-2021-3582)
      * pvrdma-ensure-correct-input-on-ring-init-CVE-2021-3607.patch
        (Closes: #990564, CVE-2021-3607)
      * pvrdma-fix-the-ring-init-error-flow-CVE-2021-3608.patch
        (Closes: #990563, CVE-2021-3608)
      * ide-atapi-check-logical-block-address-and-read-size-CVE-2020-29443.patch
        (Closes: #983575, CVE-2020-29443)
      * usb-limit-combined-packets-to-1-MiB-CVE-2021-3527.patch
        usb-redir-avoid-dynamic-stack-allocation-CVE-2021-3527.patch
        (Closes: #988157, CVE-2021-3527)
    
     -- Michael Tokarev <email address hidden>  Sun, 18 Jul 2021 16:14:41 +0300
  • qemu (1:5.2+dfsg-10) unstable; urgency=medium
    
      * 5 sdhci fixes from upstream:
        dont-transfer-any-data-when-command-time-out.patch
        dont-write-to-SDHC_SYSAD-register-when-transfer-is-in-progress.patch
        correctly-set-the-controller-status-for-ADMA.patch
        limit-block-size-only-when-SDHC_BLKSIZE-register-is-writable.patch
        reset-the-data-pointer-of-s-fifo_buffer-when-a-different-block-size...patch
        (Closes: #986795, #970937, CVE-2021-3409, CVE-2020-17380, CVE-2020-25085)
      * mptsas-remove-unused-MPTSASState.pending-CVE-2021-3392.patch
        fix possible use-after-free in mptsas_free_request
        (Cloese: #984449, CVE-2021-3392)
    
     -- Michael Tokarev <email address hidden>  Fri, 16 Apr 2021 12:43:36 +0300