[Git][security-tracker-team/security-tracker][master] Reserve DLA-2560-1 for qemu
Sylvain Beucler
beuc at debian.org
Tue Feb 16 17:00:30 GMT 2021
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f5c67140 by Sylvain Beucler at 2021-02-16T17:59:42+01:00
Reserve DLA-2560-1 for qemu
- - - - -
3 changed files:
- data/CVE/list
- data/DLA/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -20906,7 +20906,6 @@ CVE-2020-29444
CVE-2020-29443 (ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of- ...)
- qemu <unfixed>
[buster] - qemu <postponed> (Fix along in future DSA)
- [stretch] - qemu <postponed> (Fix along in future DLA)
NOTE: https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg04255.html
NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=813212288970c39b1800f63e83ac6e96588095c6
NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=b8d7f1bc59276fec85e4d09f1567613a3e14d31e
@@ -21596,7 +21595,6 @@ CVE-2020-29130 (slirp.c in libslirp through 4.3.1 has a buffer over-read because
- libslirp 4.4.0-1
- qemu 1:4.1-2
[buster] - qemu <postponed> (Fix along in future DSA)
- [stretch] - qemu <postponed> (Fix along in future DLA, when fixed upstream)
NOTE: https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f (v4.4.0)
NOTE: qemu 1:4.1-2 switched to system libslirp, marking that version as fixed.
CVE-2020-29129 (ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tri ...)
@@ -22124,7 +22122,6 @@ CVE-2020-28917 (An issue was discovered in the view_statistics (aka View fronten
CVE-2020-28916 (hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX desc ...)
- qemu 1:5.2+dfsg-1 (bug #976388; bug #974687)
[buster] - qemu <postponed> (Fix along in future DSA)
- [stretch] - qemu <postponed> (Fix along in future DLA)
NOTE: https://www.openwall.com/lists/oss-security/2020/12/01/2
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03185.html
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1893895 (duplicate)
@@ -34462,7 +34459,6 @@ CVE-2020-25085 (QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_con
CVE-2020-25084 (QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_p ...)
- qemu 1:5.2+dfsg-1 (bug #970539)
[buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
- [stretch] - qemu <postponed> (Fix along in future DLA)
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08050.html
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08043.html
NOTE: https://www.openwall.com/lists/oss-security/2020/09/16/5
@@ -53673,7 +53669,6 @@ CVE-2020-15860 (Parallels Remote Application Server (RAS) 17.1.1 has a Business
CVE-2020-15859 (QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a gues ...)
- qemu 1:5.2+dfsg-1 (bug #965978)
[buster] - qemu <postponed> (Minor issue, can be fixed along in next DSA)
- [stretch] - qemu <postponed> (Minor issue, can be fixed along in next DLA)
NOTE: Proposed patch: https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05895.html
NOTE: https://bugs.launchpad.net/qemu/+bug/1886362
NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=22dc8663d9fc7baa22100544c600b6285a63c7a3
@@ -54787,7 +54782,6 @@ CVE-2020-15470 (ffjpeg through 2020-02-24 has a heap-based buffer overflow in jf
CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback m ...)
- qemu <unfixed> (low; bug #970253)
[buster] - qemu <postponed> (Minor issue, fix along in next DSA)
- [stretch] - qemu <postponed> (Minor issue, fix along in next DSA)
NOTE: https://www.openwall.com/lists/oss-security/2020/07/02/1
NOTE: https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
NOTE: https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg00674.html
=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[16 Feb 2021] DLA-2560-1 qemu - security update
+ {CVE-2020-15469 CVE-2020-15859 CVE-2020-25084 CVE-2020-28916 CVE-2020-29130 CVE-2020-29443 CVE-2021-20181 CVE-2021-20221}
+ [stretch] - qemu 1:2.8+dfsg-6+deb9u13
[15 Feb 2021] DLA-2559-1 busybox - security update
{CVE-2011-5325 CVE-2015-9261 CVE-2016-2147 CVE-2016-2148 CVE-2017-15873 CVE-2017-16544 CVE-2018-1000517}
[stretch] - busybox 1:1.22.0-19+deb9u1
=====================================
data/dla-needed.txt
=====================================
@@ -79,9 +79,6 @@ php-pear
--
python-pysaml2 (Abhijith PA)
--
-qemu (Sylvain Beucler)
- NOTE: 20210212: packages prepared, currently testing
---
ruby-actionpack-page-caching
NOTE: 20200819: Upstream's patch on does not apply due to subsequent
NOTE: 20200819: refactoring. However, a quick look at the private
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f5c67140eb2e4828199538262896741d5ffc2f07
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f5c67140eb2e4828199538262896741d5ffc2f07
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210216/9f814cb3/attachment.html>
More information about the debian-security-tracker-commits
mailing list