[Git][security-tracker-team/security-tracker][master] Reserve DLA-4144-1 for qemu
Santiago R.R. (@santiago)
santiago at debian.org
Wed Apr 30 17:07:35 BST 2025
Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker
Commits:
14b3a15f by Santiago Ruano Rincón at 2025-04-30T13:07:23-03:00
Reserve DLA-4144-1 for qemu
- - - - -
3 changed files:
- data/CVE/list
- data/DLA/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -114935,7 +114935,6 @@ CVE-2024-26815 (In the Linux kernel, the following vulnerability has been resolv
CVE-2024-3447 (A heap-based buffer overflow was found in the SDHCI device emulation o ...)
- qemu 1:8.2.3+ds-1 (bug #1068821)
[bookworm] - qemu 1:7.2+dfsg-7+deb12u6
- [bullseye] - qemu <no-dsa> (Minor issue)
[buster] - qemu <no-dsa> (Minor issue)
NOTE: https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/
NOTE: https://patchew.org/QEMU/20240409145524.27913-1-philmd@linaro.org/
@@ -140087,7 +140086,6 @@ CVE-2015-10128 (A vulnerability was found in rt-prettyphoto Plugin up to 1.2 on
CVE-2023-6693 (A stack based buffer overflow was found in the virtio-net device of QE ...)
- qemu 1:8.2.0+ds-3
[bookworm] - qemu 1:7.2+dfsg-7+deb12u4
- [bullseye] - qemu <no-dsa> (Minor issue)
[buster] - qemu <not-affected> (Vulnerable code introduced later)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254580
NOTE: Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/e22f0603fb2fc274920a9e3a1d1306260b9a4cc4 (v5.1.0-rc0)
@@ -150457,7 +150455,6 @@ CVE-2023-5088 (A bug in QEMU could cause a guest I/O operation otherwise address
{DLA-3759-1}
- qemu 1:8.1.1+ds-2
[bookworm] - qemu 1:7.2+dfsg-7+deb12u3
- [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2247283
NOTE: Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/471a9310fd92b3e1a33d06dba2e0cf0f0b5590e0 (v7.2.7)
NOTE: Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e (v8.2.0-rc0)
@@ -168013,7 +168010,6 @@ CVE-2023-3019 (A DMA reentrancy issue leading to a use-after-free error was foun
[experimental] - qemu 1:8.1.0+ds-1~exp1
- qemu 1:8.2.0+ds-1 (bug #1041102)
[bookworm] - qemu 1:7.2+dfsg-7+deb12u4
- [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
[buster] - qemu <no-dsa> (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59243
NOTE: Proposed upstream patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg08310.html
@@ -183715,7 +183711,6 @@ CVE-2023-1545 (SQL Injection in GitHub repository nilsteampassnet/teampass prior
CVE-2023-1544 (A flaw was found in the QEMU implementation of VMWare's paravirtual RD ...)
- qemu 1:8.2.0+ds-1 (bug #1034179)
[bookworm] - qemu 1:7.2+dfsg-7+deb12u3
- [bullseye] - qemu <no-dsa> (Minor issue)
[buster] - qemu <ignored> (PVRDMA support not enabled in the binary packages)
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
NOTE: Fixed by: https://gitlab.com/qemu-project/qemu/-/commit/85fc35afa93c7320d1641d344d0c5dfbe341d087 (v8.2.0-rc0)
=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[30 Apr 2025] DLA-4144-1 qemu - security update
+ {CVE-2023-1544 CVE-2023-3019 CVE-2023-5088 CVE-2023-6693 CVE-2024-3447}
+ [bullseye] - qemu 1:5.2+dfsg-11+deb11u4
[30 Apr 2025] DLA-4143-1 glibc - security update
{CVE-2025-0395}
[bullseye] - glibc 2.31-13+deb11u12
=====================================
data/dla-needed.txt
=====================================
@@ -303,19 +303,6 @@ pytorch
NOTE: 20250422: Added by Front-Desk (rouca)
NOTE: 20250422: CVE-2025-32434 RCE need to be fixed. DoS may be postponed (rouca/FD)
--
-qemu (santiago)
- NOTE: 20240815: Added by Front-Desk (Beuc)
- NOTE: 20240815: Follow fixes from bookworm 12.4 (CVE-2023-5088)
- NOTE: 20240815: Follow fixes from bookworm 12.5 (CVE-2023-3019, CVE-2023-6693)
- NOTE: 20240815: Follow fixes from bookworm 12.6 (CVE-2024-3446,CVE-2024-3447)
- NOTE: 20240815: CVE-2024-4467 fix also proposed for 12.7 (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076504)
- NOTE: 20241119: Bookworm PU in progress https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086572
- NOTE: 20241227: WIP
- NOTE: 20250108: Still trying to reproduce CVE-2024-3446. According to upstream, it seems it is possible (santiago)
- NOTE: 20250311: resuming the work
- NOTE: 20250331: WIP, without CVE-2024-3446
- NOTE: 20250424: WIP, testing
---
rails
NOTE: 20250105: Added by Front-Desk (apo)
NOTE: 20250305: Utkarsh uploaded the CVE fixes to unstable via rails/7.2.2.1. (utkarsh)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/14b3a15fd0eda8ef7ea78702a9173e0e47cada50
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/14b3a15fd0eda8ef7ea78702a9173e0e47cada50
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250430/65cb747e/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list