Package "qemu"
Name: |
qemu
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- extra block backend modules for qemu-system and qemu-utils
- QEMU full system emulation binaries
- QEMU full system emulation binaries (arm)
- QEMU full system emulation binaries (common files)
|
Latest version: |
1:8.0.4+dfsg-1ubuntu3.23.10.2 |
Release: |
mantic (23.10) |
Level: |
security |
Repository: |
main |
Links
Other versions of "qemu" in Mantic
Packages in group
Deleted packages are displayed in grey.
Changelog
qemu (1:8.0.4+dfsg-1ubuntu3.23.10.2) mantic-security; urgency=medium
* SECURITY UPDATE: OOB read in RDMA device
- debian/patches/CVE-2023-1544.patch: protect against buggy or
malicious guest driver in hw/rdma/vmw/pvrdma_main.c.
- CVE-2023-1544
* SECURITY UPDATE: null pointer deref in NVME device
- debian/patches/CVE-2023-40360.patch: fix null pointer access in
directive receive in hw/nvme/ctrl.c.
- CVE-2023-40360
* SECURITY UPDATE: OOB read in NVME device
- debian/patches/CVE-2023-4135.patch: fix oob memory read in fdp events
log in hw/nvme/ctrl.c.
- CVE-2023-4135
* SECURITY UPDATE: division by zero via scsi block size
- debian/patches/CVE-2023-42467.patch: disallow block sizes smaller
than 512 in hw/scsi/scsi-disk.c.
- CVE-2023-42467
* SECURITY UPDATE: disk offset 0 access
- debian/patches/CVE-2023-5088.patch: cancel async DMA operation before
resetting state in hw/ide/core.c.
- CVE-2023-5088
-- Marc Deslauriers <email address hidden> Thu, 30 Nov 2023 08:22:57 -0500
|
CVE-2023-1544 |
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a |
CVE-2023-40360 |
QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is co |
CVE-2023-4135 |
A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the gues |
CVE-2023-42467 |
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent |
CVE-2023-5088 |
A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overw |
|
About
-
Send Feedback to @ubuntu_updates