Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d5e8c318 by Sylvain Beucler at 2024-08-06T20:26:55+02:00
qemu: make a pass at issues waiting for upstream patch + add links to 
patchew.org threads to ease future passes

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -135944,8 +135944,10 @@ CVE-2022-3872 (An off-by-one read/write issue was 
found in the SDHCI device of Q
        [buster] - qemu <postponed> (Minor issue, DoS, waiting for sanctioned 
patch)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2140567
        NOTE: patch proposal 1: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: patch proposal 2: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01161.html
-       NOTE: No sanctioned upstream patch as of 2023-03-09
+       NOTE: https://patchew.org/QEMU/[email protected]/
+       NOTE: No sanctioned upstream patch as of 2024-08-06
 CVE-2022-45043 (Tenda AX12 V22.03.01.16_cn is vulnerable to command injection 
via gofo ...)
        NOT-FOR-US: Tenda
 CVE-2022-45042
@@ -161733,6 +161735,11 @@ CVE-2022-36648 (The hardware emulation in the 
of_dpa_cmd_add_l2_flood of rocker
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
+       NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2023-11/msg04872.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
+       NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1851
+       NOTE: CVE is tagged disputed
 CVE-2022-36647 (PKUVCL davs2 v1.6.205 was discovered to contain a global 
buffer overfl ...)
        - davs2 <removed> (bug #1019358)
        NOTE: https://github.com/pkuvcl/davs2/issues/29
@@ -226759,7 +226766,7 @@ CVE-2021-3735 (A deadlock issue was found in the AHCI 
controller device of QEMU.
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, waiting for patch)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1997184
-       NOTE: No upstream patch as of 2023-03-09
+       NOTE: No upstream patch as of 2024-08-06
 CVE-2021-40083 (Knot Resolver before 5.3.2 is prone to an assertion failure, 
triggerab ...)
        [experimental] - knot-resolver 5.4.1-1
        - knot-resolver 5.4.1-2 (bug #991463)
@@ -278300,6 +278307,7 @@ CVE-2021-20255 (A stack overflow via an infinite 
recursion vulnerability was fou
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch, 
fixed in stretch-lts)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: 
https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Feepro100_stackoverflow1
 CVE-2021-20254 (A flaw was found in samba. The Samba smbd file server must map 
Windows ...)
        {DLA-2668-1}
@@ -279150,7 +279158,8 @@ CVE-2020-35503 (A NULL pointer dereference flaw was 
found in the megasas-gen2 SC
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1910346
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2020-12/msg06065.html
-       NOTE: No sanctioned upstream patch as of 2023-03-09
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
+       NOTE: No sanctioned upstream patch as of 2024-08-06
 CVE-2020-35502 (A flaw was found in Privoxy in versions before 3.0.29. Memory 
leaks wh ...)
        {DLA-2548-1}
        - privoxy 3.0.29-1
@@ -295211,24 +295220,27 @@ CVE-2020-25743 (hw/ide/pci.c in QEMU before 5.1.1 
can trigger a NULL pointer der
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01568.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: 
https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1
-       NOTE: No sanctioned upstream patch as of 2023-03-09
+       NOTE: No sanctioned upstream patch as of 2024-08-11
 CVE-2020-25742 (pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has 
a NULL p ...)
        - qemu <unfixed> (bug #971390)
        [bookworm] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: 
https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Flsi_nullptr1
-       NOTE: No sanctioned upstream patch as of 2023-03-09
+       NOTE: No sanctioned upstream patch as of 2024-08-06
 CVE-2020-25741 (fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL 
pointer d ...)
        - qemu <unfixed> (bug #970939)
        [bookworm] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg07779.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: 
https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Ffdc_nullptr1
-       NOTE: No sanctioned upstream patch as of 2023-03-09
+       NOTE: No sanctioned upstream patch as of 2024-08-06
 CVE-2020-25740
        RESERVED
 CVE-2020-25739 (An issue was discovered in the gon gem before gon-6.4.0 for 
Ruby. Mult ...)
@@ -318438,14 +318450,14 @@ CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps 
object may lack read/write call
        NOTE: https://www.openwall.com/lists/oss-security/2020/07/02/1
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg00674.html
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=520f26fc6d17b71a43eaf620e834b3bdf316f3d3
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=4f2a5202a05fc1612954804a2482f07bff105ea2
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=24202d2b561c3b4c48bd28383c8c34b4ac66c2bf
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=f867cebaedbc9c43189f102e4cdfdff05e88df7f
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=b5bf601f364e1a14ca4c3276f88dfec024acf613
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=921604e175b8ec06c39503310e7b3ec1e3eafe9e
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c9fb3b784000c1df32231e1c2464bb2e3fc4620
-       NOTE: 
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=735754aaa15a6ed46db51fd731e88331c446ea54
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/520f26fc6d17b71a43eaf620e834b3bdf316f3d3
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/4f2a5202a05fc1612954804a2482f07bff105ea2
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/24202d2b561c3b4c48bd28383c8c34b4ac66c2bf
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/f867cebaedbc9c43189f102e4cdfdff05e88df7f
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/b5bf601f364e1a14ca4c3276f88dfec024acf613
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/921604e175b8ec06c39503310e7b3ec1e3eafe9e
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/2c9fb3b784000c1df32231e1c2464bb2e3fc4620
 (v6.0.0-rc0)
+       NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/735754aaa15a6ed46db51fd731e88331c446ea54
 (v6.0.0-rc0)
 CVE-2020-15468 (Persian VIP Download Script 1.0 allows SQL Injection via the 
cart_edit ...)
        NOT-FOR-US: Persian VIP Download Script
 CVE-2020-15467 (The administrative interface of Cohesive Networks vns3:vpn 
appliances  ...)
@@ -383141,9 +383153,10 @@ CVE-2019-12067 (The ahci_commit_buf function in 
ide/ahci.c in QEMU allows attack
        [buster] - qemu <postponed> (Minor issue, waiting for sanctioned patch)
        - qemu-kvm <removed>
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2019-08/msg01358.html
+       NOTE: 
https://patchew.org/QEMU/[email protected]/
        NOTE: patched function introduced in 2014/2.1.50 but affected code 
pre-existed
-       NOTE: 
https://github.com/qemu/qemu/commit/659142ecf71a0da240ab0ff7cf929ee25c32b9bc
-       NOTE: No sanctioned upstream patch as of 2023-03-08
+       NOTE: 
https://github.com/qemu/qemu/commit/659142ecf71a0da240ab0ff7cf929ee25c32b9bc 
(v2.2.0-rc0)
+       NOTE: No sanctioned upstream patch as of 2024-08-06
 CVE-2019-12066
        RESERVED
 CVE-2019-12065



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d5e8c318b54e7757ab58b8c4fb4eba59746c87dc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d5e8c318b54e7757ab58b8c4fb4eba59746c87dc
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to