Change logs for qemu source package in Focal

  • qemu (1:4.2-3ubuntu6.28) focal-security; urgency=medium
    
      * SECURITY UPDATE: infinite loop in USB xHCI controller
        - debian/patches/CVE-2020-14394.patch: Fix unbounded loop in
          xhci_ring_chain_length() in hw/usb/hcd-xhci.c.
        - CVE-2020-14394
      * SECURITY UPDATE: code execution in TCG Accelerator
        - debian/patches/CVE-2020-24165.patch: fix race in cpu_exec_step_atomic
          in accel/tcg/cpu-exec.c.
        - CVE-2020-24165
      * SECURITY UPDATE: OOB access in ATI VGA device
        - debian/patches/CVE-2021-3638.patch: Fix buffer overflow in ati_2d_blt
          in hw/display/ati_2d.c.
        - CVE-2021-3638
      * SECURITY UPDATE: OOB read in RDMA device
        - debian/patches/CVE-2023-1544.patch: protect against buggy or
          malicious guest driver in hw/rdma/vmw/pvrdma_main.c.
        - CVE-2023-1544
      * SECURITY UPDATE: 9pfs special file access
        - debian/patches/CVE-2023-2861.patch: prevent opening special files in
          fsdev/virtfs-proxy-helper.c, hw/9pfs/9p-util.h.
        - CVE-2023-2861
      * SECURITY UPDATE: heap overflow in crypto device
        - debian/patches/CVE-2023-3180.patch: verify src&dst buffer length for
          sym request in hw/virtio/virtio-crypto.c.
        - CVE-2023-3180
      * SECURITY UPDATE: DoS in VNC server
        - debian/patches/CVE-2023-3354.patch: remove io watch if TLS channel is
          closed during handshake in include/io/channel-tls.h,
          io/channel-tls.c.
        - CVE-2023-3354
      * SECURITY UPDATE: disk offset 0 access
        - debian/patches/CVE-2023-5088.patch: cancel async DMA operation before
          resetting state in hw/ide/core.c.
        - CVE-2023-5088
    
     -- Marc Deslauriers <email address hidden>  Thu, 30 Nov 2023 14:45:57 -0500
  • qemu (1:4.2-3ubuntu6.27) focal-security; urgency=medium
    
      * SECURITY UPDATE: user-after-free issue
        - debian/patches/CVE-2022-1050.patch: Protect against buggy or
          malicious guest driver
        - CVE-2022-1050
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2022-4144-*.patch: Have qxl_log_command Return
          early if no log_cmd handler; Document qxl_phys2virt(); Pass requested
          buffer size to qxl_phys2virt(); Avoid buffer overrun in qxl_phys2virt;
          Assert memory slot fits in preallocated MemoryRegion
        - CVE-2022-4144
      * SECURITY UPDATE: reentrancy problem
        - debian/patches/CVE-2023-0330.patch: Fix reentrancy issues in the LSI
          controller
        - CVE-2023-0330
    
     -- Nishit Majithia <email address hidden>  Tue, 13 Jun 2023 16:58:54 +0530
  • qemu (1:4.2-3ubuntu6.26) focal; urgency=medium
    
      * d/p/u/lp-1999885-s390x-tod-kvm-don-t-save-restore-the-TOD-in-PV-guest.patch:
        avoid timer issues in s390x secure execution guests (LP: #1999885)
    
     -- Christian Ehrhardt <email address hidden>  Thu, 23 Mar 2023 08:18:28 +0100
  • qemu (1:4.2-3ubuntu6.25) focal; urgency=medium
    
      [ Brett Milford ]
      * d/p/u/lp1994002-migration-Read-state-once.patch: Fix for libvirt
        error 'migration was active, but no RAM info was set' (LP: #1994002)
    
      [ Mauricio Faria de Oliveira ]
      * d/p/u/lp2009048-vfio_map_dma_einval_amd_iommu_1tb.patch: Add hint
        to VFIO_MAP_DMA error on AMD IOMMU for VMs with ~1TB+ RAM (LP: #2009048)
    
     -- Mauricio Faria de Oliveira <email address hidden>  Thu, 02 Mar 2023 18:07:21 -0300
  • qemu (1:4.2-3ubuntu6.24) focal-security; urgency=medium
    
      * SECURITY UPDATE: DMA reentrancy issue
        - debian/patches/CVE-2021-3750.patch: Introduce MemTxAttrs::memory
          field and MEMTX_ACCESS_ERROR
        - CVE-2021-3750
      * SECURITY UPDATE: use-after-free vulnerability
        - debian/patches/CVE-2022-0216-*.patch: fix use-after-free in
          lsi_do_msgout
        - CVE-2022-0216
    
     -- Nishit Majithia <email address hidden>  Thu, 08 Dec 2022 14:45:56 +0530
  • qemu (1:4.2-3ubuntu6.23) focal-security; urgency=medium
    
      * SECURITY UPDATE: heap overflow in floppy disk emulator
        - debian/patches/CVE-2021-3507.patch: prevent end-of-track overrun in
          hw/block/fdc.c.
        - CVE-2021-3507
      * SECURITY UPDATE: integer overflow in QXL display device emulation
        - debian/patches/CVE-2021-4206.patch: check width and height in
          hw/display/qxl-render.c, hw/display/vmware_vga.c, ui/cursor.c.
        - CVE-2021-4206
      * SECURITY UPDATE: heap overflow in QXL display device emulation
        - debian/patches/CVE-2021-4207.patch: fix race condition in qxl_cursor
          in hw/display/qxl-render.c.
        - CVE-2021-4207
      * SECURITY UPDATE: memory leakage in virtio-net device
        - debian/patches/CVE-2022-26353.patch: fix map leaking on error during
          receive in hw/net/virtio-net.c.
        - CVE-2022-26353
      * SECURITY UPDATE: memory leakage in vhost-vsock device
        - debian/patches/CVE-2022-26354.patch: detach the virqueue element in
          case of error in hw/virtio/vhost-vsock.c.
        - CVE-2022-26354
    
     -- Marc Deslauriers <email address hidden>  Thu, 09 Jun 2022 11:35:04 -0400
  • qemu (1:4.2-3ubuntu6.22) focal; urgency=medium
    
      * d/p/u/lp-1967814-*: avoid interpreting failed scsi requests as
        good which could lead to silent data corruption (LP: #1967814)
        This refactors handling of sense codes and SCSI status to be able
        detect, handle and pass that information to the guest as needed.
    
     -- Christian Ehrhardt <email address hidden>  Wed, 06 Apr 2022 14:24:56 +0200
  • qemu (1:4.2-3ubuntu6.21) focal-security; urgency=medium
    
      * SECURITY UPDATE: crash or code exec in USB redirector device emulation
        - debian/patches/CVE-2021-3682.patch: fix free call in
          hw/usb/redirect.c.
        - CVE-2021-3682
      * SECURITY UPDATE: heap use-after-free in virtio_net_receive_rcu
        - debian/patches/CVE-2021-3748.patch: fix use after unmap/free for sg
          in hw/net/virtio-net.c.
        - CVE-2021-3748
      * SECURITY UPDATE: off-by-one error in mode_sense_page()
        - debian/patches/CVE-2021-3930.patch: MODE_PAGE_ALLS not allowed in
          MODE SELECT commands in hw/scsi/scsi-disk.c.
        - CVE-2021-3930
      * SECURITY UPDATE: NULL dereference in floppy disk emulator
        - debian/patches/CVE-2021-20196-1.patch: Extract
          blk_create_empty_drive() in hw/block/fdc.c.
        - debian/patches/CVE-2021-20196-2.patch: kludge missing floppy drive in
          hw/block/fdc.c.
        - CVE-2021-20196
      * SECURITY UPDATE: integer overflow in vmxnet3 NIC emulator
        - debian/patches/CVE-2021-20203.patch: validate configuration values
          during activate in hw/net/vmxnet3.c.
        - CVE-2021-20203
    
     -- Marc Deslauriers <email address hidden>  Tue, 22 Feb 2022 12:44:44 -0500
  • qemu (1:4.2-3ubuntu6.20) focal; urgency=medium
    
      * d/p/u/lp1953338-*: KVM hardware diagnose 318 data improvements
        (LP: #1953338)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 24 Jan 2022 11:37:27 +0100
  • qemu (1:4.2-3ubuntu6.19) focal; urgency=medium
    
      * d/p/u/lp-1749393-linux-user-Reserve-space-for-brk.patch: fix static
        use cases needing a lot of brk space (LP: #1749393)
      * d/p/u/lp-1929926-target-s390x-Fix-translation-exception-on-illegal-in.patch:
        fix uretprobe in s390x TCG (LP: #1929926)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 26 Apr 2021 11:11:19 +0200
  • qemu (1:4.2-3ubuntu6.18) focal; urgency=medium
    
      * enhance loading of old modules post upgrade (LP: #1913421)
        - d/rules: d/qemu-system-gui.{prerm,postrm}.in: do not save gui modules
          (can't be loaded late)
        - d/qemu-block-extra.postrm.in: clear all (current and former) modules
          on purge
        - d/qemu-block-extra.prerm.in: test for exec and prepare /var/run/qemu
          if needed
    
     -- Christian Ehrhardt <email address hidden>  Thu, 19 Aug 2021 14:10:54 +0200
  • qemu (1:4.2-3ubuntu6.17) focal-security; urgency=medium
    
      * SECURITY UPDATE: NULL pointer dereference in MemoryRegionOps object
        - debian/patches/CVE-2020-15469-1.patch: add pci-intack write method in
          hw/pci-host/prep.c.
        - debian/patches/CVE-2020-15469-2.patch: add pcie-msi read method in
          hw/pci-host/designware.c.
        - debian/patches/CVE-2020-15469-3.patch: add quirk device write method
          in hw/vfio/pci-quirks.c.
        - debian/patches/CVE-2020-15469-4.patch: add ppc-parity write method in
          hw/ppc/prep_systemio.c.
        - debian/patches/CVE-2020-15469-5.patch: add nrf51_soc flash read
          method in hw/nvram/nrf51_nvm.c.
        - debian/patches/CVE-2020-15469-6.patch: add spapr msi read method in
          hw/ppc/spapr_pci.c.
        - debian/patches/CVE-2020-15469-7.patch: add dummy read/write methods
          in hw/misc/tz-ppc.c.
        - debian/patches/CVE-2020-15469-8.patch: add digprog mmio write method
          in hw/misc/imx7_ccm.c.
        - CVE-2020-15469
      * SECURITY UPDATE: NULL pointer dereference flaw in SCSI emulation
        - debian/patches/CVE-2020-35504.patch: always check current_req is not
          NULL before use in DMA callbacks in hw/scsi/esp.c.
        - CVE-2020-35504
      * SECURITY UPDATE: NULL pointer dereference flaw in am53c974 SCSI
        - debian/patches/CVE-2020-35505.patch: ensure cmdfifo is not empty and
          current_dev is non-NULL in hw/scsi/esp.c.
        - CVE-2020-35505
      * SECURITY UPDATE: use-after-free flaw was found in the MegaRAID emulator
        - debian/patches/CVE-2021-3392.patch: Remove unused MPTSASState pending
          field in hw/scsi/mptsas.c, hw/scsi/mptsas.h.
        - CVE-2021-3392
      * SECURITY UPDATE: out-of-bounds read/write in SDHCI controller emulation
        - debian/patches/CVE-2021-3409-1.patch: don't transfer any data when
          command time out in hw/sd/sdhci.c.
        - debian/patches/CVE-2021-3409-2.patch: don't write to SDHC_SYSAD
          register when transfer is in progress in hw/sd/sdhci.c.
        - debian/patches/CVE-2021-3409-3.patch: correctly set the controller
          status for ADMA in hw/sd/sdhci.c.
        - debian/patches/CVE-2021-3409-4.patch: limit block size only when
          SDHC_BLKSIZE register is writable in hw/sd/sdhci.c.
        - debian/patches/CVE-2021-3409-5.patch: reset the data pointer of
          s->fifo_buffer[] when a different block size is programmed in
          hw/sd/sdhci.c.
        - CVE-2021-3409
      * SECURITY UPDATE: stack overflow via infinite loop issue in various NIC
        - debian/patches/CVE-2021-3416-1.patch: introduce qemu_receive_packet()
          in include/net/net.h, include/net/queue.h, net/net.c, net/queue.c.
        - debian/patches/CVE-2021-3416-2.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/e1000.c.
        - debian/patches/CVE-2021-3416-3.patch: switch to use
          qemu_receive_packet() for loopback packet in hw/net/dp8393x.c.
        - debian/patches/CVE-2021-3416-5.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/sungem.c.
        - debian/patches/CVE-2021-3416-6.patch: switch to use
          qemu_receive_packet_iov() for loopback in hw/net/net_tx_pkt.c.
        - debian/patches/CVE-2021-3416-7.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/rtl8139.c.
        - debian/patches/CVE-2021-3416-8.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/pcnet.c.
        - debian/patches/CVE-2021-3416-9.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/cadence_gem.c.
        - debian/patches/CVE-2021-3416-10.patch: switch to use
          qemu_receive_packet() for loopback in hw/net/lan9118.c.
        - CVE-2021-3416
      * SECURITY UPDATE: DoS in USB redirector device
        - debian/patches/CVE-2021-3527-1.patch: avoid dynamic stack allocation
          in hw/usb/redirect.c.
        - debian/patches/CVE-2021-3527-2.patch: limit combined packets to 1 MiB
          in hw/usb/combined-packet.c.
        - CVE-2021-3527
      * SECURITY UPDATE: multiple issues in virtio vhost-user GPU device
        - debian/patches/CVE-2021-3544-1.patch: fix memory disclosure in
          contrib/vhost-user-gpu/virgl.c.
        - debian/patches/CVE-2021-3544-2.patch: fix resource leak in
          contrib/vhost-user-gpu/vhost-user-gpu.c.
        - debian/patches/CVE-2021-3544-3.patch: fix memory leak in
          contrib/vhost-user-gpu/vhost-user-gpu.c.
        - debian/patches/CVE-2021-3544-4.patch: fix memory leak in
          contrib/vhost-user-gpu/vhost-user-gpu.c.
        - debian/patches/CVE-2021-3544-5.patch: fix memory leak in
          contrib/vhost-user-gpu/virgl.c.
        - debian/patches/CVE-2021-3544-6.patch: fix memory leak in
          contrib/vhost-user-gpu/virgl.c.
        - debian/patches/CVE-2021-3544-7.patch: fix OOB write in
          contrib/vhost-user-gpu/virgl.c.
        - debian/patches/CVE-2021-3544-8.patch: abstract vg_cleanup_mapping_iov
          in contrib/vhost-user-gpu/vhost-user-gpu.c,
          contrib/vhost-user-gpu/virgl.c, contrib/vhost-user-gpu/vugpu.h.
        - CVE-2021-3544
        - CVE-2021-3545
        - CVE-2021-3546
      * SECURITY UPDATE: mremap overflow in the pvrdma device
        - debian/patches/CVE-2021-3582.patch: check lengths in
          hw/rdma/vmw/pvrdma_cmd.c.
        - CVE-2021-3582
      * SECURITY UPDATE: integer overflow in pvrdma device
        - debian/patches/CVE-2021-3607.patch: ensure correct input on ring init
          in hw/rdma/vmw/pvrdma_main.c.
        - CVE-2021-3607
      * SECURITY UPDATE: uninitialized memory unmap in pvrdma device
        - debian/patches/CVE-2021-3608.patch: fix the ring init error flow in
          hw/rdma/vmw/pvrdma_dev_ring.c.
        - CVE-2021-3608
      * SECURITY UPDATE: out-of-bounds access issue in ARM Generic Interrupt
        Controller
        - debian/patches/CVE-2021-20221.patch: fix interrupt ID in GICD_SGIR
          register in hw/intc/arm_gic.c.
        - CVE-2021-20221
      * SECURITY UPDATE: infinite loop while processing transmit descriptors
        - debian/patches/CVE-2021-20257.patch: fail early for evil descriptor
          in hw/net/e1000.c.
        - CVE-2021-20257
    
     -- Marc Deslauriers <email address hidden>  Mon, 12 Jul 2021 11:03:37 -0400
  • qemu (1:4.2-3ubuntu6.16) focal; urgency=medium
    
      * d/p/u/lp-1921754*: add EPYC-Rome-v2 as v1 missed IBRS and thereby fails
        on some HW/Guest combinations e.g. Windows 10 on Threadripper chips
        (LP: #1921754)
      * d/p/u/lp-1921880*: add EPYC-Milan features and named cpu type support
        (LP: #1921880)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 07 Apr 2021 11:58:29 +0200
  • qemu (1:4.2-3ubuntu6.15) focal; urgency=medium
    
      * d/p/u/lp-1921468-*: fix issues handling boot menu index on s390x
        (LP: #1921468)
      * d/p/u/lp-1887535-configure-replace-enable-disable-git-update-with-wit.patch,
        d/rules: Backport --with-git-submodules param so building from git repo
        doesn't fail (LP: #1887535)
      * Fix byte aligned writes when writing to image stored on NFS
        server, as they aren't required to be 4kib aligned. (LP: #1921665)
        - d/p/u/lp-1921665-1-block-Require-aligned-image-size-to-avoid-assert.patch
        - d/p/u/lp-1921665-2-file-posix-Allow-byte-aligned-O_DIRECT-with-NFS.patch
    
     -- Christian Ehrhardt <email address hidden>  Fri, 26 Mar 2021 10:38:47 +0100
  • qemu (1:4.2-3ubuntu6.14) focal-security; urgency=medium
    
      * SECURITY REGRESSION: fix multiple regressions caused by CVE-2020-13754
        security update (LP: #1914883)
        - debian/patches/ubuntu/CVE-2020-13754-3.patch: log invalid memory
          accesses in memory.c.
        - debian/patches/ubuntu/CVE-2020-13754-4.patch: allow 16-bit writes to
          memory region in hw/riscv/sifive_test.c.
        - debian/patches/ubuntu/CVE-2020-13754-5.patch: allow 64-bit accesses
          in hw/timer/slavio_timer.c.
        - debian/patches/ubuntu/CVE-2020-13754-6.patch: allow less than 32-bit
          accesses in hw/char/bcm2835_aux.c.
        - debian/patches/ubuntu/CVE-2020-13754-9.patch: fix
          valid.max_access_size to access address registers in
          hw/usb/hcd-xhci.c.
    
     -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2021 08:17:08 -0500
  • qemu (1:4.2-3ubuntu6.13) focal; urgency=medium
    
      * d/p/u/lp-1903864-tpm_emulator-Report-an-error-if-chardev-is-missing.patch:
        fix tpm-emulator: parameter 'chardev' is missing (LP: #1903864)
      * d/p/u/lp-1913395-*: qemu s390x/pci: Honor vfio DMA limiting (LP: #1913395)
    
     -- Christian Ehrhardt <email address hidden>  Thu, 28 Jan 2021 09:20:37 +0100
  • qemu (1:4.2-3ubuntu6.12) focal-security; urgency=medium
    
      * SECURITY UPDATE: heap overread in iscsi_aio_ioctl_cb
        - debian/patches/ubuntu/CVE-2020-11947.patch: fix heap-buffer-overflow
          in block/iscsi.c.
        - CVE-2020-11947
      * SECURITY UPDATE: use-after-free in e1000e
        - debian/patches/ubuntu/CVE-2020-15859.patch: forbid the reentrant RX
          in net/queue.c.
        - CVE-2020-15859
      * SECURITY UPDATE: OOB write to MSI-X table
        - debian/patches/ubuntu/CVE-2020-27821.patch: clamp cached translation
          in case it points to an MMIO region in exec.c.
        - CVE-2020-27821
      * SECURITY UPDATE: infinite loop in e1000e
        - debian/patches/ubuntu/CVE-2020-28916.patch: advance desc_offset in
          case of null descriptor in hw/net/e1000e_core.c.
        - CVE-2020-28916
      * SECURITY UPDATE: out of bounds read in atapi
        - debian/patches/ubuntu/CVE-2020-29443-1.patch: assert that the buffer
          pointer is in range in hw/ide/atapi.c.
        - debian/patches/ubuntu/CVE-2020-29443-2.patch: check logical block
          address and read size in hw/ide/atapi.c.
        - CVE-2020-29443
      * SECURITY UPDATE: use after free in 9p
        - debian/patches/ubuntu/CVE-2021-20181.patch: fully restart unreclaim
          loop in hw/9pfs/9p.c.
        - CVE-2021-20181
    
     -- Marc Deslauriers <email address hidden>  Wed, 03 Feb 2021 10:56:08 -0500
  • qemu (1:4.2-3ubuntu6.11) focal; urgency=medium
    
      * d/p/ubuntu/lp-1907656-s390x-s390-virtio-ccw-Reset-PCI-devices-during-subsy:
        avoid PCI devices to become unavailable on reset (LP: #1907656)
    
     -- Christian Ehrhardt <email address hidden>  Tue, 05 Jan 2021 15:52:00 +0100
  • qemu (1:4.2-3ubuntu6.10) focal-security; urgency=medium
    
      * SECURITY UPDATE: heap buffer overflow in sdhci_sdma_transfer_multi_blocks()
        - debian/patches/ubuntu/CVE-2020-17380.patch: fix DMA Transfer Block
          Size field in hw/sd/sdhci.c.
        - CVE-2020-17380
        - CVE-2020-25085
      * SECURITY UPDATE: use-after-free via unchecked return value
        - debian/patches/ubuntu/CVE-2020-25084.patch: check return value of
          'usb_packet_map' in hw/usb/hcd-xhci.c.
        - CVE-2020-25084
      * SECURITY UPDATE: out-of-bound access issue
        - debian/patches/ubuntu/CVE-2020-25624.patch: check len and
          frame_number variables in hw/usb/hcd-ohci.c.
        - CVE-2020-25624
      * SECURITY UPDATE: infinite loop when a TD list has a loop
        - debian/patches/ubuntu/CVE-2020-25625.patch: check for processed TD
          before retire in hw/usb/hcd-ohci.c.
        - CVE-2020-25625
      * SECURITY UPDATE: assertion failure through usb_packet_unmap()
        - debian/patches/ubuntu/CVE-2020-25723.patch: check return value of
          'usb_packet_map' in hw/usb/hcd-ehci.c.
        - CVE-2020-25723
      * SECURITY UPDATE: bounds issue in ati_2d_blt
        - debian/patches/ubuntu/CVE-2020-27616.patch: check x y display
          parameter values in hw/display/ati_2d.c.
        - CVE-2020-27616
      * SECURITY UPDATE: assertion failure
        - debian/patches/ubuntu/CVE-2020-27617.patch: remove an assert call in
          eth_get_gso_type in net/eth.c.
        - CVE-2020-27617
    
     -- Marc Deslauriers <email address hidden>  Fri, 20 Nov 2020 08:12:00 -0500
  • qemu (1:4.2-3ubuntu6.9) focal; urgency=medium
    
      * d/p/ubuntu/define-ubuntu-machine-types.patch: update to fix 15.04 wily
        machine type to match how it originally was released (LP: #1902654)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 04 Nov 2020 15:34:47 +0100
  • qemu (1:4.2-3ubuntu6.8) focal; urgency=medium
    
      * d/p/u/lp-1894942-*: fix virtio-ccw host/guest notification (LP: #1894942)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 21 Sep 2020 15:35:30 +0200
  • qemu (1:4.2-3ubuntu6.7) focal; urgency=medium
    
      * d/p/ubuntu/lp-1882774-*: add newer EPYC processor types (LP: #1887490)
      * d/p/u/lp-1896751-exec-rom_reset-Free-rom-data-during-inmigrate-skip.patch:
        fix reboot after migration (LP: #1896751)
      * d/p/u/lp-1849644-io-channel-websock-treat-binary-and-no-sub-protocol-.patch:
        fix websocket compatibility with newer versions of noVNC (LP: #1849644)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 27 Jul 2020 11:45:26 +0200
  • qemu (1:4.2-3ubuntu6.6) focal-security; urgency=medium
    
      * SECURITY UPDATE: out-of-bounds read/write in USB emulator
        - debian/patches/ubuntu/CVE-2020-14364.patch: fix setup_len init in
          hw/usb/core.c.
        - CVE-2020-14364
    
     -- Marc Deslauriers <email address hidden>  Tue, 15 Sep 2020 10:02:08 -0400
  • qemu (1:4.2-3ubuntu6.5) focal; urgency=medium
    
      * further stabilize qemu by importing patches of qemu v4.2.1
        Fixes (LP: #1891203) and (LP: #1891877)
        - d/p/stable/lp-1891877-*
        - as part of the stabilization this also fixes an
          riscv emulation issue due to the CVE-2020-13754 fixes via
          d/p/ubuntu/hw-riscv-Allow-64-bit-access-to-SiFive-CLINT.patch
      * fix s390x SQXBR emulation (LP: #1883984)
        - d/p/ubuntu/lp-1883984-target-s390x-Fix-SQXBR.patch
      * fix -no-reboot for s390x protvirt guests (LP: #1890154)
        - d/p/ubuntu/lp-1890154-s390x-protvirt-allow-to-IPL-secure-guests-with-*
    
     -- Christian Ehrhardt <email address hidden>  Wed, 19 Aug 2020 13:40:49 +0200
  • qemu (1:4.2-3ubuntu6.4) focal-security; urgency=medium
    
      * SECURITY UPDATE: assert failure in nbd
        - debian/patches/ubuntu/CVE-2020-10761.patch: avoid long error message
          assertions in nbd/server.c, tests/qemu-iotests/143,
          tests/qemu-iotests/143.out.
        - CVE-2020-10761
      * SECURITY UPDATE: out-of-bounds read and write in sm501
        - debian/patches/ubuntu/CVE-2020-12829-pre1.patch: convert printf +
          abort to qemu_log_mask.
        - debian/patches/ubuntu/CVE-2020-12829-pre2.patch: shorten long
          variable names in sm501_2d_operation.
        - debian/patches/ubuntu/CVE-2020-12829-pre3.patch: use BIT(x) macro to
          shorten constant.
        - debian/patches/ubuntu/CVE-2020-12829-pre4.patch: clean up local
          variables in sm501_2d_operation.
        - debian/patches/ubuntu/CVE-2020-12829.patch: replace hand written
          implementation with pixman where possible.
        - debian/patches/ubuntu/CVE-2020-12829-2.patch: optimize small
          overlapping blits.
        - debian/patches/ubuntu/CVE-2020-12829-3.patch: fix bounds checks.
        - debian/patches/ubuntu/CVE-2020-12829-4.patch: drop unneded variable.
        - debian/patches/ubuntu/CVE-2020-12829-5.patch: do not allow guest to
          set invalid format.
        - debian/patches/ubuntu/CVE-2020-12829-6.patch: introduce variable for
          commonly used value for better readability.
        - debian/patches/ubuntu/CVE-2020-12829-7.patch: fix and optimize
          overlap check.
        - CVE-2020-12829
      * SECURITY UPDATE: out-of-bounds read during sdhci_write() operations
        - debian/patches/ubuntu/CVE-2020-13253.patch: do not switch to
          ReceivingData if address is invalid in hw/sd/sd.c.
        - CVE-2020-13253
      * SECURITY UPDATE: out-of-bounds access during es1370_write() operation
        - debian/patches/ubuntu/CVE-2020-13361.patch: check total frame count
          against current frame in hw/audio/es1370.c.
        - CVE-2020-13361
      * SECURITY UPDATE: out-of-bounds read via crafted reply_queue_head
        - debian/patches/ubuntu/CVE-2020-13362-1.patch: use unsigned type for
          reply_queue_head and check index in hw/scsi/megasas.c.
        - debian/patches/ubuntu/CVE-2020-13362-2.patch: avoid NULL pointer
          dereference in hw/scsi/megasas.c.
        - debian/patches/ubuntu/CVE-2020-13362-3.patch: use unsigned type for
          positive numeric fields in hw/scsi/megasas.c.
        - CVE-2020-13362
      * SECURITY UPDATE: NULL pointer dereference related to BounceBuffer
        - debian/patches/ubuntu/CVE-2020-13659.patch: set map length to zero
          when returning NULL in exec.c, include/exec/memory.h.
        - CVE-2020-13659
      * SECURITY UPDATE: out-of-bounds access via msi-x mmio operation
        - debian/patches/ubuntu/CVE-2020-13754-1.patch: revert accepting
          mismatching sizes in memory_region_access_valid in memory.c.
        - debian/patches/ubuntu/CVE-2020-13754-2.patch: accept byte and word
          access to core ACPI registers in hw/acpi/core.c.
        - CVE-2020-13754
      * SECURITY UPDATE: infinite recursion in ati-vga
        - debian/patches/ubuntu/CVE-2020-13800.patch: check mm_index before
          recursive call in hw/display/ati.c.
        - CVE-2020-13800
      * SECURITY UPDATE: division by zero in oss_write()
        - debian/patches/ubuntu/CVE-2020-14415.patch: fix buffer pos
          calculation in audio/ossaudio.c.
        - CVE-2020-14415
      * SECURITY UPDATE: buffer overflow in XGMAC Ethernet controller
        - debian/patches/ubuntu/CVE-2020-15863.patch: check bounds in
          hw/net/xgmac.c.
        - CVE-2020-15863
      * SECURITY UPDATE: reachable assertion failure
        - debian/patches/ubuntu/CVE-2020-16092.patch: fix assertion failure in
          hw/net/net_tx_pkt.c.
        - CVE-2020-16092
    
     -- Marc Deslauriers <email address hidden>  Tue, 11 Aug 2020 12:30:06 -0400
  • qemu (1:4.2-3ubuntu6.3) focal; urgency=medium
    
      * debian/patches/ubuntu/lp-1878973-*: fix assert in qemu-guest-agent that
        crashes it on shutdown (LP: #1878973)
      * d/p/ubuntu/lp-1882774-*: fix issues with VMX subfeatures on systems not
        supporting to set them (LP: #1882774)
    
     -- Christian Ehrhardt <email address hidden>  Tue, 02 Jun 2020 10:42:49 +0200
  • qemu (1:4.2-3ubuntu6.2) focal; urgency=medium
    
      * d/p/ubuntu/lp-1805256*: Fixes for QEMU on aarch64 ARM hosts
        - async: use explicit memory barriers (LP: #1805256)
        - aio-wait: delegate polling of main AioContext if BQL not held
    
     -- Rafael David Tinoco <email address hidden>  Wed, 27 May 2020 21:19:20 +0000
  • qemu (1:4.2-3ubuntu6.1) focal-security; urgency=medium
    
      * SECURITY UPDATE: DoS via integer overflow in ati_2d_blt()
        - debian/patches/ubuntu/CVE-2020-11869.patch: fix checks in
          ati_2d_blt() to avoid crash in hw/display/ati_2d.c.
        - CVE-2020-11869
    
     -- Marc Deslauriers <email address hidden>  Thu, 14 May 2020 08:25:24 -0400
  • qemu (1:4.2-3ubuntu6) focal; urgency=medium
    
      [ Christian Ehrhardt ]
      * enable riscv build (LP: #1872931)
        [ changes picked from Debian ]
        - enable support for riscv64 hosts
        - only enable librbd on architectures where it is built
        - ceph: do not list librados-dev as we only use librbd-dev and the latter
          depends on the former
        - seccomp grew up, no need in versioned build-dep
        - enable seccomp only on architectures where it can be built
      * d/p/ubuntu/lp-1872931-*: fix build on non KVM platforms
      * d/p/ubuntu/lp-1872945-*: fix riscv emulation errors that e.g. hung ssh
        and clobbered doubles (LP: #1872945)
    
      [ William Grant ]
      * d/control-in: disable rbd support unavailable on riscv (LP: 1872931)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 15 Apr 2020 14:27:15 +0200
  • qemu (1:4.2-3ubuntu5) focal; urgency=medium
    
      * d/p/ubuntu/lp-1871830-*: avoid crash when using QEMU_MODULE_DIR
        (LP: #1871830)
      * Security and packaging fixes (LP: #1872937)
        - arm-fix-PAuth-sbox-functions-CVE-2020-10702.patch
        - net-tulip-check-frame-size-and-r-w-data-length-CVE-2020-11102.patch
          CVE-2020-10702
          CVE-2020-11102
        - fix external spice UI
          + install ui-spice-app.so in qemu-system-common
          + install ui-spice-app.so only if built, spice is optional
        - switch binfmt registration to use update-binfmts --[un]import (#866756)
        - qemu-system-gui: Multi-Arch=same, not foreign (#956763)
        - qemu-system-data: s/highcolor/hicolor/ (#955741)
      * d/p/ubuntu/lp-1872107*: fix migration while rebooting guests (LP: #1872107)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 15 Apr 2020 11:26:44 +0200
  • qemu (1:4.2-3ubuntu4) focal; urgency=medium
    
      * d/p/ubuntu/lp-1835546-*: backport the s390x protvirt feature (LP: #1835546)
      * remove d/p/ubuntu/expose-vmx_qemu64cpu.patch: Stop adding VMX to qemu64
        to avoid broken nesting (LP: #1868692)
    
     -- Christian Ehrhardt <email address hidden>  Fri, 20 Mar 2020 08:02:16 +0100
  • qemu (1:4.2-3ubuntu3) focal; urgency=medium
    
      * d/p/stable/lp-1867519-*: Stabilize qemu 4.2 with upstream
        patches @qemu-stable (LP: #1867519)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 18 Mar 2020 13:57:57 +0100
  • qemu (1:4.2-3ubuntu2) focal; urgency=medium
    
      * allow qemu to load old modules post upgrade (LP: #1847361)
        - d/p/ubuntu/lp-1847361-modules-load-upgrade.patch: to fallback module
          load to a versioned path
        - d/qemu-block-extra.*.in, d/qemu-system-gui.*.in: save shared objects on
          upgrade
        - d/rules: generate maintainer scripts matching package version on build
        - d/rules: enable --enable-module-upgrades where --enable-modules is set
      * d/p/ubuntu/lp-1847361-vhost-correctly-turn-on-VIRTIO_F_IOMMU_PLATFORM.patch:
        avoid unnecessary IOTLB transactions (LP: #1866207)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 02 Mar 2020 15:21:27 +0100
  • qemu (1:4.2-3ubuntu1) focal; urgency=medium
    
      * Merge with Debian testing, remaining changes:
        - qemu-kvm to systemd unit
          - d/qemu-kvm-init: script for QEMU KVM preparation modules, ksm,
            hugepages and architecture specifics
          - d/qemu-system-common.qemu-kvm.service: systemd unit to call
            qemu-kvm-init
          - d/qemu-system-common.install: install helper script
          - d/qemu-system-common.maintscript: clean old sysv and upstart scripts
          - d/qemu-system-common.qemu-kvm.default: defaults for
            /etc/default/qemu-kvm
          - d/rules: call dh_installinit and dh_installsystemd for qemu-kvm
        - Distribution specific machine type (LP: 1304107 1621042)
          - d/p/ubuntu/define-ubuntu-machine-types.patch: define distro machine
            types
          - d/qemu-system-x86.NEWS Info on fixed machine type definitions
            for host-phys-bits=true (LP: 1776189)
          - add an info about -hpb machine type in debian/qemu-system-x86.NEWS
          - provide pseries-bionic-2.11-sxxm type as convenience with all
            meltdown/spectre workarounds enabled by default. (LP: 1761372).
          - ubuntu-q35 alias added to auto-select the most recent q35 ubuntu type
        - Enable nesting by default
          - d/p/ubuntu/expose-vmx_qemu64cpu.patch: expose nested kvm by default
            in qemu64 cpu type.
          - d/p/ubuntu/enable-svm-by-default.patch: Enable nested svm by default
            in qemu64 on amd
            [ No more strictly needed, but required for backward compatibility ]
        - improved dependencies
          - Make qemu-system-common depend on qemu-block-extra
          - Make qemu-utils depend on qemu-block-extra
          - let qemu-utils recommend sharutils
        - improved s390x support
          - d/rules: build s390-ccw.img with upstream Makefile
          - d/rules: build s390-netboot.img with upstream Makefile
        - arch aware kvm wrappers
        - tolerate ipxe size change on migrations to >=18.04 (LP: 1713490)
          - d/p/ubuntu/pre-bionic-256k-ipxe-efi-roms.patch: old machine types
            reference 256k path
          - d/control-in: depend on ipxe-qemu-256k-compat-efi-roms to be able to
            handle incoming migrations from former releases.
        - d/control-in: Disable capstone disassembler library support (universe)
        - d/binfmt-update-in: fix binfmt being called in some containers
          (LP 1840956)
        - d/p/ubuntu/lp-1857033-*: add support for Cooper Lake cpu model
          (LP 1857033)
        - d/qemu-system-x86.README.Debian: add info about updated nesting changes
        - d/control*, d/rules: disable xen by default, but provide universe
          package qemu-system-x86-xen as alternative
        - d/p/lp-1859527-*: avoid breakage on high virtqueue counts (LP 1859527)
      - Dropped changes [ in Debian ]
        - d/control: update VCS links
        - d/control-in: bump debhelper build-dep for compat 12
        - d/control: disable bluetooth being deprecated
        - d/not-installed: ignore new interop docs and extra icons for now
        - d/not-installed: do not install elf2dmp until namespaced
        - d/qemu-utils.install: install new tools qemu-edid and qemu-keymap
          [ not needed ]
        - d/control-in: promote qemu-efi/ovmf in Ubuntu (LP 1570617)
        - s390x support
          - Create qemu-system-s390x package
          - Enable numa support for s390x
        - d/control*: enable libpmem support for nvdimms (LP 1790856)
      * Added changes
        - d/control: regenerate debian/control out of control-in
        - qemu-system-x86-microvm package
          In addition to the generic multi-purpose qemu also provide a minimal
          feature binary that is loading faster for use cases with microvm machine
          type and qboot bios
          - d/control-in: add a new qemu-system-x86-microvm package
          - d/rules: add an extra config/build step to get the minimal qemu
        - d/control-in: disable pmem on ppc64 as it is currently considered
          experimental on that architecture (pmdk v1.8-1)
        - d/rules: makefile definitions can't be recursive - sys_systems for s390x
        - d/p/ubuntu/vhost-user-gpu-Drop-trailing-json-comma.patch: fix parsing of
          vhost-user-gpu
        - d/rules: report config log from the correct subdir
        - d/rules: --disable-xen for user-static builds
    
    qemu (1:4.2-3) unstable; urgency=medium
    
      * mention closing of #909743 in previous changelog (Closes: #909743)
      * do not link to qemu-skiboot from qemu-system-ppc (Closes: #950431)
      * provide+conflict qemu-skiboot from qemu-system-data,
        as we are not using this package anymore
    
    qemu (1:4.2-2) unstable; urgency=medium
    
      [ Fabrice Bauzac ]
      * Fix a typo in the description of the qemu binary package
    
      [ Frédéric Bonnard ]
      * Enable powernv emulation with skiboot firmware
    
      [ Michael R. Crusoe ]
      * Modernize watch file (Closes: #909743)
    
      [ Christian Ehrhardt ]
      * d/control-in: promote qemu-efi/ovmf in Ubuntu
      * d/control-in: bump debhelper build-dep for compat 12
      * - d/control-in: update VCS links
      * - d/control-in: disable bluetooth being deprecated
      * d/not-installed: ignore new interop docs and extra icons for now
      * do not install elf2dmp until namespaced
      * d/control-in: Enable numa support for s390x
      * Create qemu-system-s390x package (Ubuntu only for now)
    
      [ Michael Tokarev ]
      * stop using inttypes.h in qboot code;
        this makes dependency on libc6-dev-i386 to be unnecessary
      * qboot-no-jump-tables.diff - use #pragma for one file in qboot
      * do not install qemu-edid and qemu-keymap for now
      * no need in bluetooth patches as bluetooth is disabled
      * scsi-cap-block-count-from-GET-LBA-STATUS-CVE-2020-1711.patch
        (Closes: #949731, CVE-2020-1711)
      * enable libpmem support on amd64|arm64|ppc64el (Closes: #935327)
    
     -- Christian Ehrhardt <email address hidden>  Wed, 12 Feb 2020 15:21:56 +0100
  • qemu (1:4.2-1ubuntu2) focal; urgency=medium
    
      * d/control: avoid upgrade issues triggered by moving ivshmem tools after
        Debian. Fixed by by bumping the related Breaks/Replaces to the
        Version Ubuntu introduced the change (LP: #1862287)
    
     -- Christian Ehrhardt <email address hidden>  Fri, 07 Feb 2020 07:31:21 +0100
  • qemu (1:4.2-1ubuntu1) focal; urgency=medium
    
      * Merge with Debian testing, Among many other things this fixes LP Bugs:
        LP: #1847806 - add mff* instructions to not break on ppc64 with newer glibc
        LP: #1812822 - avoid crashes on detaching vhost_net interfaces
        LP: #1852744 - Crypto Passthrough Interrupt Support
        LP: #1853316 - CCW IPL Support
        Remaining changes:
        - qemu-kvm to systemd unit
          - d/qemu-kvm-init: script for QEMU KVM preparation modules, ksm,
            hugepages and architecture specifics
          - d/qemu-system-common.qemu-kvm.service: systemd unit to call
            qemu-kvm-init
          - d/qemu-system-common.install: install helper script
          - d/qemu-system-common.maintscript: clean old sysv and upstart scripts
          - d/qemu-system-common.qemu-kvm.default: defaults for
            /etc/default/qemu-kvm
          - d/rules: call dh_installinit and dh_installsystemd for qemu-kvm
        - Distribution specific machine type (LP: 1304107 1621042)
          - d/p/ubuntu/define-ubuntu-machine-types.patch: define distro machine
            types
          - d/qemu-system-x86.NEWS Info on fixed machine type definitions
            for host-phys-bits=true (LP: 1776189)
          - add an info about -hpb machine type in debian/qemu-system-x86.NEWS
          - provide pseries-bionic-2.11-sxxm type as convenience with all
            meltdown/spectre workarounds enabled by default. (LP: 1761372).
        - Enable nesting by default
          - d/p/ubuntu/expose-vmx_qemu64cpu.patch: expose nested kvm by default
            in qemu64 cpu type.
          - d/p/ubuntu/enable-svm-by-default.patch: Enable nested svm by default
            in qemu64 on amd
            [ No more strictly needed, but required for backward compatibility ]
        - improved dependencies
          - Make qemu-system-common depend on qemu-block-extra
          - Make qemu-utils depend on qemu-block-extra
          - let qemu-utils recommend sharutils
        - s390x support
          - Create qemu-system-s390x package
          - Enable numa support for s390x
          - d/rules: build s390-ccw.img with upstream Makefile
          - d/rules: build s390-netboot.img with upstream Makefile
        - arch aware kvm wrappers
        - d/control: update VCS links
        - tolerate ipxe size change on migrations to >=18.04 (LP: 1713490)
          - d/p/ubuntu/pre-bionic-256k-ipxe-efi-roms.patch: old machine types
            reference 256k path
          - d/control-in: depend on ipxe-qemu-256k-compat-efi-roms to be able to
            handle incoming migrations from former releases.
        - d/control-in: Disable capstone disassembler library support (universe)
        - d/control: disable bluetooth being deprecated
        - d/not-installed: ignore new interop docs and extra icons for now
        - d/not-installed: do not install elf2dmp until namespaced
        - d/qemu-utils.install: install new tools qemu-edid and qemu-keymap
        - d/control-in: promote qemu-efi/ovmf in Ubuntu (LP 1570617)
        - d/binfmt-update-in: fix binfmt being called in some containers
          (LP 1840956)
      - Dropped changes (in Debian)
        - qemu-guest-agent: freeze-hook fixes (LP: 1484990)
          - d/qemu-guest-agent.install: provide /etc/qemu/fsfreeze-hook
          - d/qemu-guest-agent.dirs: provide /etc/qemu/fsfreeze-hook.d
        - d/control-in: enable RDMA support in qemu (LP: 1692476)
            - enable RDMA config option
            - add libibumad-dev build-dep
        - d/p/ubuntu/lp-1790901-partial-SLOF-for-s390x-netboot.patch: bring back
          some SLOF bits stripped in DFSG to be able to build s390x-netboot roms
          As that hack to build s390-ccw.img rom can't build s390x-netboot.img
          replace it with a build-indep using the upstream makefiles.
          This is less prone to miss future changes/fixes that are done to the
          makefiles
        - remove /dev/kvm permission handling (moved to systemd 239-6) (#892945)
        - d/p/debianize-qemu-guest-service.patch: fix path of qemu-ga
        - d/rules: fix qemu-kvm service for debhelper compat >=12
        - Refreshed patches for v4.0 context changes
        - d/control*: remove sdlabi which was removed upstream
        - d/control*: enable docs (now explicit) and provide new build-dep
          python3-sphinx
        - d/qemu-system-data.install: use new paths for formerly used icons
        - Merge with Upstream release of qemu 4.0
        - d/p/ubuntu/lp-1790901-partial-SLOF-for-s390x-netboot.patch
      - Dropped changes (Upstream)
        - d/p/ubuntu/lp-1830243-*: s390x Secure Linux Boot Toleration (LP 1830243)
        - d/p/ubuntu/lp-1830238-*: s390x hardware cpu model (LP 1830238)
        - d/p/ubuntu/linux-user-fix-__NR_semtimedop-undeclared-error.patch:
          fix i386 build error
        - d/p/ubuntu/lp-1836066-s390-cpumodel-fix-description-for-the-new-vector-fac:
          fix naming of the new vector facitlity (LP 1836066)
        - d/p/ubuntu/lp-1836159-fix-with-latest-kernel.patch: fix build issues
          for missing SIOCGSTAMP definition; final fix is still in discussion
          upstream (LP: 1836159)
        - d/p/ubuntu/lp-1836154-*: further fixups for HW CPU model for newer
          s390x machines (LP 1836154)
        - d/p/ubuntu/lp-1841066-*: fix detection of arch_capability flags
          (LP 1841066)
        - d/p/lp-1842774-s390x-cpumodel-Add-the-z15-name-to-the-description-o.patch:
          update the z15 model name (LP 1842774)
        - d/p/ubuntu/lp-1848556-curl-Handle-success-in-multi_check_completion.patch:
          fix a potential hang when qemu or qemu-img where accessing http backed
          disks via libcurl (LP 1848556)
        - d/p/u/lp-1848497-virtio-balloon-fix-QEMU-4.0-config-size-migration-*:
          fix migration issue from qemu <4.0 when using virtio-balloon (LP 1848497)
        - d/p/ubuntu/lp-1830704-s390x-cpumodel-ignore-csske-for-expansion.patch
          toleration for future machines (LP 1830704)
        - SECURITY UPDATE: Add support for exposing md-clear functionality
          to guests
          - d/p/ubuntu/enable-md-clear.patch
          - d/p/ubuntu/enable-md-no.patch
          - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
        - SECURITY UPDATE: heap overflow when loading device tree blob
          - d/p/ubuntu/CVE-2018-20815.patch: specify how large the buffer to
            copy the device tree blob into is.
          - CVE-2018-20815
        - SECURITY UPDATE: device driver denial of service via NULL pointer
          dereference
          - d/p/ubuntu/CVE-2019-5008.patch: Define skeleton 'power_mem_read'
            routine
          - CVE-2019-5008
        - SECURITY UPDATE: information leak in SLiRP
          - d/p/ubuntu/CVE-2019-9824.patch: check sscanf result when
            emulating ident.
          - CVE-2019-9824
        - d/p/ubuntu/lp-1812384-s390x-Return-specification-exception-for-
          unimplement.patch: properly return architecture defined exception
          on bad subcodes of diag 308 (LP 1812384)
      * Dropped changes (no more needed)
        - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
          mv_conffile since the new path is a directory in the old package
          version which can not be handled by mv_conffile.
          [ only needed between disco and eoan ]
        - disable pvrdma
          [ CVEs all fixed now ]
        - d/p/ubuntu/Revert-target-i386-kvm-add-VMX-migration-blocker.patch:
          avoid misdetection of simplified nesting blocking all migrations
          [ qemu now detects and handles nesting - needs kernel >=4.20 ]
        - Enable nesting by default
          - d/qemu-system-x86.modprobe: set nested=1 module option on intel.
            (is default on amd)
          - d/qemu-system-x86.postinst: re-load kvm_intel.ko if it was loaded
            without nested=1
            [ nesting is default in kernel modules and default selected cpu types ]
      * Added changes
        - d/control: regenerate debian/control out of control-in
        - updated ubuntu machine types to match qemu 4.2 in Ubuntu 20.04 Focal
          - added ubuntu focal types for qemu 4.2
          - ubuntu-q35 alias added to auto-select the most recent q35 ubuntu type
        - d/p/ubuntu/lp-1857033-*: add support for Cooper Lake cpu model
          (LP: #1857033)
        - d/qemu-system-x86.README.Debian: add info about updated nesting changes
        - d/control*, d/rules: disable xen by default, but provide universe
          package qemu-system-x86-xen as alternative
        - fix typos in changelog and d/qemu-system-x86.NEWS
        - d/p/lp-1859527-*: avoid breakage on high virtqueue counts (LP: #1859527)
        - d/control*: enable libpmem support for nvdimms (LP: #1790856)
    
    qemu (1:4.2-1) unstable; urgency=medium
    
      * new upstream release (4.2.0)
      * removed patches: v4.1.1.diff, enable-pschange-mc-no.patch
      * do not make sgabios.bin executable (lintian)
      * add s390-netboot.img lintian overrides for qemu-system-data
      * build qboot (bios-microvm.bin)
      * build-depend-indep on libc6-dev-i386 for qboot
        (includes some system headers)
    
    qemu (1:4.1-3) unstable; urgency=medium
    
      * mention #939869 (CVE-2019-15890) in previous changelog entry
      * add Provides: sgabios to qemu-data (Closes: #945924)
      * fix qemu-debootsrtap (add hppa arch, print correct error message)
        thanks to Helge Deller (Closes: #923410)
      * enable long binfmt masks again for mips/mips32 (Closes: #829243)
    
    qemu (1:4.1-2) unstable; urgency=medium
    
      * build sgabios in build-indep, conflict with sgabios package
      * qemu-system-ppc: build and install canyonlands.dtb in addition to bamboo.dtb
      * remove duplicated CVE-2018-20123 & CVE-2018-20124 in prev changelog
      * move s390 firmware build rules to debian/s390fw.mak, build s390-netboot.img
      * imported v4.1.1.diff - upstream stable branch
        Closes: CVE-2019-12068
        Closes: #945258, #945072
      * enable-pschange-mc-no.patch: i386: add PSCHANGE_MC_NO feature
        to allow disabling ITLB multihit mitigations in nested hypervisors
        Closes: #944623
      * build-depend on nettle-dev, enable nettle, and clarify --enable-lzo
      * switch to system libslirp, build-depend on libslirp-dev
        Closes: #939869, CVE-2019-15890
    
    qemu (1:4.1-1) unstable; urgency=medium
    
      * new upstream release v4.1
        Closes: #933741, CVE-2019-14378 (slirp buff overflow in packet reassembly)
         (use internal slirp copy for now)
        Closes: #931351, CVE-2019-13164 (qemu-bridge-helper long IFNAME)
        Closes: #922923, CVE-2019-8934 (ppc64 emulator leaks hw identity)
        Closes: #916442, CVE-2018-20123 (pvrdma memory leak in device hotplug)
        Closes: #922461, CVE-2018-20124 (pvrdma num_sge can exceed MAX_SGE)
        Closes: #927924 (new upstream version)
        Closes: #897054 (AMD Zen CPU support)
        Closes: #935324 (FTBFS due to gluster API change)
        Closes: CVE-2018-20125 (pvrdma: DoS in create_cq_ring|create_qp_rings)
        Closes: CVE-2018-20126 (pvrdma: memleaks in create_cq_ring|create_qp_rings)
        Closes: CVE-2018-20191 (pvrdma: DoS due to missing read operation impl.)
        Closes: CVE-2018-20216 (pvrdma: infinite loop in pvrdma_dev_ring.c)
      * remove patches which are applied upstream, refresh remaining patches
        (bt-use-size_t-...-CVE-2018-19665.patch hasn't been applied upstream,
        bluetooth subsystem is going to be removed, we keep it for now)
      * debian/source/options: ignore slirp/ submodule
      * use python3 for building, not python
      * debian/optionrom.mk: add pvh.bin
      * switch from libssh2 to libssh, and enable libssh support in ubuntu
      * bump spice version requiriment to 0.12.5
      * enable pvrdma
      * debian/control-in: remove reference to libsdl
      * debian/rules: add new objects for s390-ccw fw
      * debian/control: add build dependency on python3-sphinx for docs
      * install ui/icons/qemu.svg and qemu.desktop
      * debian/rules: remove pc-bios/bamboo.dtb before building it
      * install vhost-user-gpu binary and 50-qemu-gpu.json
      * debian/rules: remove old maintscript-helper invocations, not needed anymore
      * remove +dfsg for now, upload whole upstream source, will trim it later
    
     -- Christian Ehrhardt <email address hidden>  Wed, 08 Jan 2020 15:27:42 +0100
  • qemu (1:4.0+dfsg-0ubuntu11) focal; urgency=medium
    
      * SECURITY UPDATE: infinite loop when executing LSI scsi adapter
        emulator scripts
        - d/p/u/CVE-2019-12068.patch: Move the existing loop exit
        - CVE-2019-12068
      * SECURITY UPDATE: null pointer dereference in qxl display driver
        - d/p/u/CVE-2019-12155.patch: qxl: check release info object
        - CVE-2019-12155
      * SECURITY UPDATE: qemu-bridge-helper interface name buffer overflow
        - d/p/u/CVE-2019-13164.patch: qemu-bridge-helper: restrict
          interface name to IFNAMSIZ
        - CVE-2019-13164
      * SECURITY UPDATE: heap overflow in slirp
        - d/p/u/CVE-2019-14378.patch: slirp: Fix heap overflow in ip_reass
          on big packet input
        - CVE-2019-14378
      * SECURITY UPDATE: use after free vulnerability in slirp
        - d/p/u/CVE-2019-15890.patch: slirp: ip_reass: Fix use after free
        - CVE-2019-15890
      * Add support for exposing "taa-no" flag to guests:
        - d/p/u/CVE-2019-11135-taa-no.patch
        - CVE-2019-11135
      * Add support for exposing "pschange-mc-no" to guests:
        - d/p/u/pschange-mce.patch
    
     -- Steve Beattie <email address hidden>  Thu, 07 Nov 2019 20:54:32 -0800
  • qemu (1:4.0+dfsg-0ubuntu10) focal; urgency=medium
    
      * d/p/ubuntu/lp-1848556-curl-Handle-success-in-multi_check_completion.patch:
        fix a potential hang when qemu or qemu-img where accessing http backed
        disks via libcurl (LP: #1848556)
      * d/p/u/lp-1848497-virtio-balloon-fix-QEMU-4.0-config-size-migration-in.patch:
        fix migration issue from qemu <4.0 when using virtio-balloon (LP: #1848497)
    
     -- Christian Ehrhardt <email address hidden>  Mon, 21 Oct 2019 14:51:45 +0200
  • qemu (1:4.0+dfsg-0ubuntu9) eoan; urgency=medium
    
      * d/p/lp-1842774-s390x-cpumodel-Add-the-z15-name-to-the-description-o.patch:
        update the z15 model name (LP: #1842774)
    
     -- Christian Ehrhardt <email address hidden>  Tue, 24 Sep 2019 11:42:58 +0200