------------------------------------------------------------------------- Debian LTS Advisory DLA-4144-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Santiago Ruano Rincón April 30, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : qemu Version : 1:5.2+dfsg-11+deb11u4 CVE ID : CVE-2023-1544 CVE-2023-3019 CVE-2023-5088 CVE-2023-6693 CVE-2024-3447 Debian Bug : 1034179 1041102 1068821 Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or information leak. CVE-2023-1544 Potential out-of-bounds read and crash via VMWare's paravirtual RDMA device. CVE-2023-3019 Use-after-free error in the e1000e NIC emulation. CVE-2023-5088 IDE guest I/O operation addressed to an arbitrary disk offset may potentially allow to overwrite the VM's boot code. CVE-2023-6693 Stack based buffer overflow in the virtio-net device emulation that may be exploited to cause information leak. CVE-2024-3447 Heap-based buffer overflow in SDHCI device emulation. For Debian 11 bullseye, these problems have been fixed in version 1:5.2+dfsg-11+deb11u4. We recommend that you upgrade your qemu packages. For the detailed security status of qemu please refer to its security tracker page at: https://security-tracker.debian.org/tracker/qemu Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature